{"id":23196698,"url":"https://github.com/compasssecurity/bluetooth_low_energy_ble","last_synced_at":"2026-01-19T15:01:51.615Z","repository":{"id":78542829,"uuid":"242955729","full_name":"CompassSecurity/Bluetooth_Low_Energy_BLE","owner":"CompassSecurity","description":null,"archived":false,"fork":false,"pushed_at":"2020-05-13T09:14:58.000Z","size":9693,"stargazers_count":26,"open_issues_count":0,"forks_count":3,"subscribers_count":8,"default_branch":"master","last_synced_at":"2025-04-05T08:30:39.133Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/CompassSecurity.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2020-02-25T09:06:14.000Z","updated_at":"2025-01-07T12:15:48.000Z","dependencies_parsed_at":"2023-04-14T12:54:01.039Z","dependency_job_id":null,"html_url":"https://github.com/CompassSecurity/Bluetooth_Low_Energy_BLE","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/CompassSecurity/Bluetooth_Low_Energy_BLE","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CompassSecurity%2FBluetooth_Low_Energy_BLE","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CompassSecurity%2FBluetooth_Low_Energy_BLE/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CompassSecurity%2FBluetooth_Low_Energy_BLE/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CompassSecurity%2FBluetooth_Low_Energy_BLE/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/CompassSecurity","download_url":"https://codeload.github.com/CompassSecurity/Bluetooth_Low_Energy_BLE/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CompassSecurity%2FBluetooth_Low_Energy_BLE/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28572573,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-19T14:39:55.009Z","status":"ssl_error","status_checked_at":"2026-01-19T14:39:01.217Z","response_time":67,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-12-18T14:20:12.616Z","updated_at":"2026-01-19T15:01:51.608Z","avatar_url":"https://github.com/CompassSecurity.png","language":null,"readme":"# Bluetooth Low Energy BLE Beertalk\n\n![Logo](logo.png)\n\n## What is this?\n\nThis is a repository containing some data and links for my Beer-Talk about Bluetooth Low Energy (BLE).\nSee https://www.compass-security.com/de/agenda/detail/beer-talk-in-bern-bluetooth-low-energy-protocol-security-attacks/ for more infos about this event.\n\n## Slides\n\n* Compass Beer-Talk: [bluetooth_low_energy_ble_beertalk_2020-05-07.pdf](https://github.com/CompassSecurity/Bluetooth_Low_Energy_BLE/raw/master/slides/bluetooth_low_energy_ble_beertalk_2020-05-07.pdf)\n* Full Version: [bluetooth_low_energy_ble_protocol_security_attacks_full_version_v1.0.pdf](https://github.com/CompassSecurity/Bluetooth_Low_Energy_BLE/raw/master/slides/bluetooth_low_energy_ble_protocol_security_attacks_full_version_v1.0.pdf)\n\n## Videos\n\n### Presentation\n\n- Compass Beer-Talk (07.05.2020, German): https://www.youtube.com/watch?v=hmhj3HyO48U\n\n### Demo Videos\n\n- BLE Hacking Demo: 1 - Sniffing a new Connection: https://www.youtube.com/watch?v=NVzCURC9380\n- BLE Hacking Demo: 2 - Sniffing an Existing Connection: https://www.youtube.com/watch?v=SKYK8nkj2Kw\n- BLE Hacking Demo: 3 - Device Interaction: https://www.youtube.com/watch?v=u3EzQXImME0\n- BLE Hacking Demo: 4 - Connection Hijacking: https://www.youtube.com/watch?v=a-2PtDKXHTs\n\n## Example PCAPs\n\nSee [pcaps](./pcaps) directory for example PCAPs.\n\n## Hardware / Software References\n\n- Micro:Bit Sniffing Hardware: https://microbit.org/\n- BtleJack Sniffing Software: https://github.com/virtualabs/btlejack\n\n## References\n\n### Specifications\n\n- Bluetooth Special Interest Group (SIG): https://www.bluetooth.com/\n- Bluetooth Core Specifications Download: https://www.bluetooth.com/specifications/bluetooth-core-specification\n- Bluetooth GATT Specifications: https://www.bluetooth.com/specifications/gatt\n- Bluetooth GATT Characteristics: https://www.bluetooth.com/specifications/gatt/characteristics\n- Bluetooth GATT Overview: https://www.bluetooth.com/specifications/gatt/generic-attributes-overview\n- Linux Bluetooth Protocol Stack BlueZ: http://www.bluez.org/\n\n### BLE Introduction\n\n- Introduction to Bluetooth Low Energy: https://learn.adafruit.com/introduction-to-bluetooth-low-energy/introduction\n- Reverse Engineering a Bluetooth Low Energy Light Bulb: https://learn.adafruit.com/reverse-engineering-a-bluetooth-low-energy-light-bulb/explore-gatt\n- Introducing the Adafruit Bluefruit LE Sniffer: https://learn.adafruit.com/introducing-the-adafruit-bluefruit-le-sniffer/introduction\n- Bluetooth Range Information: https://blog.nordicsemi.com/getconnected/things-you-should-know-about-bluetooth-range\n- Getting Started with Bluetooth Low Energy. O'Reilly. 2014. ISBN: 9781491900550.\n\n### BLE Pairing\n\n- BLE Pairing and Bonding: https://www.kynetics.com/docs/2018/BLE_Pairing_and_bonding/\n- Bluetooth Pairing Part 1: Pairing Feature Exchange: https://www.bluetooth.com/blog/bluetooth-pairing-part-1-pairing-feature-exchange/\n- Bluetooth Pairing Part 2: Key Generation Methods: https://www.bluetooth.com/blog/bluetooth-pairing-part-2-key-generation-methods\n- Bluetooth Pairing Part 3: Low Energy Legacy Pairing Passkey Entry: https://www.bluetooth.com/blog/bluetooth-pairing-passkey-entry\n- Bluetooth Pairing Part 4: Bluetooth Low Energy Secure Connections - Numeric Comparison: https://www.bluetooth.com/blog/bluetooth-pairing-part-4/\n\n### BLE Privacy\n\n- Bluetooth Technology Protecting Your Privacy: https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/\n\n### COVID19\n\n- Corona-App: Apple und Google wollen Regierungswünschen nachkommen: https://www.heise.de/newsticker/meldung/Corona-App-Apple-und-Google-wollen-Regierungswuenschen-nachkommen-4709428.html\n- Die Schweizer Corona-Warn-App kommt – das sind die wichtigsten Fakten: https://www.netzwoche.ch/news/2020-05-04/die-schweizer-corona-warn-app-kommt-das-sind-die-wichtigsten-fakten\n- Decentralized Privacy-Preserving Proximity Tracing: https://github.com/DP-3T/documents/\n- Contact Tracing App DP3T - These are the Risks of the Swiss Solution. Marc Ruef: https://www.scip.ch/en/?labs.20200427\n- DP3t: Privacy and Security Attacks on Digital Proximity Tracing Systems:\n- https://github.com/DP-3T/documents/blob/master/Security%20analysis/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf\n- Privacy-Preserving Contact Tracing. Apple \u0026 Google: https://www.apple.com/covid19/contacttracing/\n\n### BLE Security Research\n\n- Understanding Bluetooth Security: https://duo.com/decipher/understanding-bluetooth-security\n- Mike Ryan, Bluetooth LE Security: https://lacklustre.net/bluetooth/\n- A Basic Introduction to BLE Security: https://www.digikey.com/eewiki/display/Wireless/A+Basic+Introduction+to+BLE+Security\n- Deep Dive into Bluetooth LE Security: https://medium.com/rtone-iot-security/deep-dive-into-bluetooth-le-security-d2301d640bfc\n\n### BLE Security Talks\n\n- Mike Ryan. USENIX WOOT. August 2013. Bluetooth: With Low Energy Comes Low Security\n  - Video: https://www.youtube.com/watch?v=Mo-FsEmaqpo\n  - Slides: https://lacklustre.net/bluetooth/bluetooth_with_low_energy_comes_low_security-mikeryan-usenix_woot_2013-slides.pdf\n  - Whitepaper: https://lacklustre.net/bluetooth/Ryan_Bluetooth_Low_Energy_USENIX_WOOT.pdf\n- Tal Melamed. SHA2017. Hack-a-ble\n  - Video: https://media.ccc.de/v/SHA2017-230-hack-a-ble\n- Mike Ryan. BlackHat 2013. Bluetooth Smart: The Good, the Bad, the Ugly, and the Fix!\n  - Video: https://www.youtube.com/watch?v=SoH11fi-FcA\n  - Slides: https://lacklustre.net/bluetooth/bluetooth_smart_good_bad_ugly_fix-mikeryan-blackhat_2013.pdf\n- Slawomir Jasek. Blue Picking - Hacking Bluetooth Smart Locks. HackInTheBox 2017\n  - Slides: https://conference.hitb.org/hitbsecconf2017ams/materials/D2T3%20-%20Slawomir%20Jasek%20-%20Blue%20Picking%20-%20Hacking%20Bluetooth%20Smart%20Locks.pdf\n- Damien Cauquil. Weaponizing the BBC Micro Bit. DEF CON 25. 2017\n  - Video: https://www.youtube.com/watch?v=I9AqIaMjYcw\n  - Slides: https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEF%20CON%2025%20-%20Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf\n- Damien Cauquil. Bluetooth Low Energy Attacks. Crash Course. 2018\n  - Slides: https://nis-summer-school.enisa.europa.eu/2018/cources/IOT/nis-summer-school-damien-cauquil-BLE-workshop.pdf\n- Damien Cauquil. You had better secure your BLE devices. DEF CON 26. 2018\n  - Video: https://www.youtube.com/watch?v=VHJfd9h6G2s\n  - Slides: https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf\n- Mike Ryan. Bluetooth Hacking: Tools And Techniques. hardwear.io 2019\n  - Video: https://www.youtube.com/watch?v=8kXbu2Htteg\n  - Slides: https://hardwear.io/usa-2019/presentations/Bluetooth-Hacking-Mike%20Ryan-hardwear-io-usa-2019.pdf\n- Taking Bluetooth lockpicking to the next level. Ray and mh. CCCamp19. 2019\n  - Video: https://media.ccc.de/v/Camp2019-10241-taking_bluetooth_lockpicking_to_the_next_level\n- Damien Cauquil. Defeating BLE 5 PRNG for Fun and Jamming. DEF CON 27. 2019\n  - Video: https://www.youtube.com/watch?v=wkIdpK7mAk4\n  - Slides: https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF\n- Jan Ruge. No PoC? No Fix! - A sad Story about Bluetooth Security. DiVOC. 2020.\n  - Video: https://media.ccc.de/v/DiVOC-7-no_poc_no_fix_a_sad_story_about_bluetooth_security\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcompasssecurity%2Fbluetooth_low_energy_ble","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcompasssecurity%2Fbluetooth_low_energy_ble","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcompasssecurity%2Fbluetooth_low_energy_ble/lists"}