Have fun and learn how to secure the devices - by hands-on hacking BLE, NFC/RFID, embedded hardware, based on smart locks, access control systems and other high risk deices.

BlackHat USA 2025 training

Bluetooth Low Energy Hacking Masterclass

Las Vegas

BlackHat USA 2025 Conference

This intensive two-day training provides a deep dive into Bluetooth Low Energy security, equipping cybersecurity professionals with advanced skills to identify, analyze, and exploit vulnerabilities in BLE devices. The session begins with the foundational exploration on how this technology works by interacting with your dedicated, included device: understanding BLE broadcasting (advertising device presence, trackers, beacons) and connections (services, characteristics, GATT reading/writing/notifications). You will quickly turn on your simulated “lightbulb” and surprisingly - you will already be able to take control over so many devices that do not implement any security mechanisms at all.

OutOfTheBox Jakarta 2025 training

Bluetooth Low Energy and NFC/RFID Security Essentials

Jakarta

OutOfTheBox Conference

Bluetooth Low Energy (BLE) and NFC/RFID are widely used wireless technologies that power a broad range of devices, from IoT gadgets and toys to high-stakes systems like access control systems, smart locks, medical equipment, and payment solutions. With the rapid growth in the number of such devices, securing them has become a critical priority, driving a surging demand for specialists in this field. This unique hands-on course meets this demand by providing a thorough overview of the security of BLE and NFC technologies, along with practical, real-world skills that are immediately applicable.

Hardwear.io 2024 USA

Security Assessment of Bluetooth Low Energy devices

Santa Clara, USA

Hardwear.io

Bluetooth Low Energy is one of the most common and rapidly growing IoT technologies. We are immersed in surrounding BLE signals: phones, beacons, wearables, TVs, home appliances, toothbrushes, sex toys, light bulbs, smart locks, electric scooters, cars, medical devices, crypto wallets, 2FA, banking tokens, payment terminals - to name just a few. Unfortunately the prevalence of technology does not come with security. Alarming vulnerabilities are revealed day by day – not only in individual devices’ implementations, but also generic: in the Bluetooth specification itself. And yet, the knowledge on how to comprehensively assess security of such devices still remains uncommon. This training aims to fill this gap, with the best possible - hands-on approach.