How Do I "BLE Hacking"?

Want to start hacking Bluetooth Low Energy (BLE)? Don’t have the time to learn all the things? Look no further! The three goals for this talk: 1) Familiarization – you’ll get the basics of the Attribute Protocol (ATT) and the Generic Attribute Profile (GATT), 2) Tools – a quick look at essential tools such as bluez, bleno, ubertooth, PyBT, crackle, scapy, as well as our custom tools, and how to use them, and 3) Fun – along the way, we’ll show you how to impose your will on a set of commercially available industrial sensors using techniques like passive credential sniffing, BLE server cloning and impersonation, and reverse engineering at the application layer. Why? There’s arguably no better time to get into BLE security, as it continues to proliferate in a wide variety of markets. Some of the more interesting BLE stuff you can buy include: breathalyzers, pad/bike/door locks, fitness trackers, heart rate monitors, temperature sensors, data loggers, fluid pressure gauges, water well depth readers, garage door openers, automotive OBDII sensors, pressure cookers, running socks, prosthetics, and you guessed it, baby pacifiers.