Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Find out more about Bluetooth Session Hijacking Presented by CTO, Dr. Brett Walkenhorst
Attackers employ complex strategies to jam peripheral devices, which leads to a timeout and connection loss on the central device, giving the attacker access to take control of it. The term “window widening,” is a Bluetooth protocol feature that an attacker could use to control one side of a connection. Discover more about the use of tools that cause these attacks in this clip, which highlights the importance of awareness and diligence in Bluetooth security procedures.
Bluetooth Session Hijacking — Bastille
For more on Bluetooth:
- Bastille Webinar: Bluetooth Vulnerabilities Part 1 (from this snippet)
- Bastille Webinar: Bluetooth Vulnerabilities Part 2
- Bastille White Paper: Bluetooth Vulnerabilities