Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Check Out This Brief Video on MitM Attacks
In this excerpted video, CTO Dr. Brett Walkenhorst dives into Bluetooth MitM (man-in-the-middle) attacks. He covers the background on this attack type before moving into some specific examples. Some of the attacks he touches on include GATTacker, BTLEjuice, InjectaBLE, and BtleJack.
Bluetooth MitM Attacks — Bastille
For more on Bluetooth:
- Bastille Webinar: Bluetooth Vulnerabilities Part 1 (from this snippet)
- Bastille Webinar: Bluetooth Vulnerabilities Part 2
- Bastille White Paper: Bluetooth Vulnerabilities