Bluetooth Snippets
- Bluetooth Overview
- BLE and Wi-Fi Channels
- Bluetooth Connections
- Bluetooth Key Generation – Part 2
- Bluetooth Frequency Hopping and Packet Transfer
- Bluetooth PHYs and Ranges – Part 2
- Bluetooth Issues
- Bluetooth Keystroke Injection
- Bluetooth Keystroke Injection – Mitigation
- Bluetooth Threats – Implementation Flaws
- Bluetooth Threats – Implementation Flaws – Mitigation
- Bluetooth Summary
- Bluetooth PHYs and Ranges – Part 1
- Bluetooth Key Generation – Part 1
- Bluetooth Modulation and Multiple Access
- Bluetooth Connections – Part 1
- Bluetooth Monitoring
- Bluetooth Monitoring – What Can You Do?
- Bluetooth DoS Attacks
- Bluetooth Session Hijacking
- Bluetooth MitM Attacks
- How AI Accelerates Wireless Attacks
Excerpt From Bluetooth Vulnerabilities (Part 1) Webinar
Watch CTO Dr. Brett Walkenhorst on Bluetooth PHYs and Ranges
It’s easy to picture the relatively short range for a connection between two personal devices like a cellphone and a headset and come to the conclusion that Bluetooth only works over these kinds of very short distances. However, as Brett described in this video, Bluetooth can actually work over significant distances. He shares examples of organizations that were able to amplify the connectivity range even as much as 5x the average expected range. This has security implications due to the fact that Bluetooth related attacks do no necessarily need to be actioned by a malicious actor who is in close range.
Bluetooth PHYs and Ranges – Part 1 — Bastille
For more on Bluetooth:
- Bastille Webinar: Bluetooth Vulnerabilities Part 1 (from this snippet)
- Bastille Webinar: Bluetooth Vulnerabilities Part 2
- Bastille White Paper: Bluetooth Vulnerabilities