Bluetooth Hacking
Course Description
Bluetooth is everywhere - phones, IoT, cars, medical devices. Learn to assess and exploit Bluetooth vulnerabilities.
Course Structure
Modules
Module 1: Bluetooth Fundamentals (5h)
- Bluetooth architecture
- Classic vs BLE
- Pairing mechanisms
- Security modes
Module 2: Reconnaissance (5h)
- Device discovery
- Service enumeration
- GATT analysis
- Characteristic discovery
Module 3: Classic Bluetooth (5h)
- Bluejacking
- Bluesnarfing
- Bluebugging
- PIN cracking
Module 4: BLE Attacks (6h)
- GATT exploitation
- Characteristic abuse
- Pairing bypass
- Replay attacks
Module 5: Device Exploitation (5h)
- Smart lock attacks
- Fitness tracker hacking
- Medical device testing
- Automotive Bluetooth
Module 6: Advanced Techniques (4h)
- Jamming
- Man-in-the-middle
- Firmware extraction
- Protocol fuzzing
Tools
| Tool | Purpose |
|---|---|
| Ubertooth | BT sniffing |
| bettercap | BLE attacks |
| GATTacker | MITM |
| nRF Connect | BLE analysis |
📄️ Overview
Bluetooth security: BLE attacks, device exploitation, and protocol analysis