Bluetooth Session Hijacking

Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Find out more about Bluetooth Session Hijacking Presented by CTO, Dr. Brett Walkenhorst

Attackers employ complex strategies to jam peripheral devices, which leads to a timeout and connection loss on the central device, giving the attacker access to take control of it. The term “window widening,” is a Bluetooth protocol feature that an attacker could use to control one side of a connection. Discover more about the use of tools that cause these attacks in this clip, which highlights the importance of awareness and diligence in Bluetooth security procedures.

Bluetooth Session Hijacking — Bastille

For more on Bluetooth:

For more information: