Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Charmve/BLE-Security-Attack-Defence
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
https://github.com/Charmve/BLE-Security-Attack-Defence
ble ble-security bluefuzz bluetooth-fuzz bluetooth-le bluetooth-low-energy bluetooth-stack bluetoothle fuzzing hacking reverse reverse-proxy stack vulnerability wireless
Last synced: 21 days ago
JSON representation
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
- Host: GitHub
- URL: https://github.com/Charmve/BLE-Security-Attack-Defence
- Owner: Charmve
- License: bsd-2-clause
- Created: 2020-09-29T11:47:34.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2024-03-06T15:55:10.000Z (9 months ago)
- Last Synced: 2024-04-15T09:05:25.703Z (8 months ago)
- Topics: ble, ble-security, bluefuzz, bluetooth-fuzz, bluetooth-le, bluetooth-low-energy, bluetooth-stack, bluetoothle, fuzzing, hacking, reverse, reverse-proxy, stack, vulnerability, wireless
- Language: Python
- Homepage: https://github.com/Charmve
- Size: 38.6 MB
- Stars: 265
- Watchers: 11
- Forks: 38
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
- Code of conduct: Code-of-Conduct.md
- Security: Security Vulnerabilities in Bluetooth Technology as Used in IoT.pdf
Awesome Lists containing this project
- awesome-hacking-lists - Charmve/BLE-Security-Attack-Defence - ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks. (Python)
README
Bluetooth-LE Security: Method, Tools and Stack
## ✨ News! ✨
- 2020.10.13: A heap-based type confusion affecting Linux kernel 4.8 and higher was discovered in ``net/bluetooth/l2cap_core.c.`` by Google Security Research !
- 2020.03.26: A memory corruption issue was addressed with improved input validation by Qihoo 360 Alpha Lab !
Fuzzing
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
Stateful Black-Box Fuzzing of BLE Devices Using Automata Learning
BRAKTOOTH: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing
Towards Automated Fuzzing of 4G/5G Protocol Implementations Over the Air.
more ...
## BLE Vulnerability TOP5
- BlueBorne
- BleedingBit
- SweynTooth
- BtleJuice
- BLE-CTF
## Table of Content
```
📂 BLE-Security-Attack&Defence
|-- 📂 BLE Vulnerability TOP5
| |-- 📂 BlueBorne
| |-- 📂 BleedingBit
| |-- 📂 SweynTooth
| |-- 📂 BtleJuice
| |-- 📂 BLE-CTF
|-- 📂 ble-stack
| |-- 📂 Mynewt-Nimble
| |-- 📂 nRF5_SDK_15.0.0_a53641a
| |-- 📂 PyBluez
| |-- 📂 LightBlue
|-- 📂 cap - capture package
| |-- 📂 CrackLE
| |-- 📂 TI-BLTE2Pcap
| |-- 📂 blefuzz_V21
| |-- 📂 Fuzzing Bluetooth
|-- 📂 image
|-- 📂 tools - hardware&sofrware
| |-- 📂 Ubertooth
| |-- 📂 GATTacker
| |-- 📂 BladeRF
| |-- 📂 HackRF
| |-- 📂 Adafruit-BluefruitLE
...
```## Bluetooth LE Vulnerabilities
BlueBorne: A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device
Ben Seri & Gregory Vishnepolsky
In this talk we will present the ramifications of airborne attacks, which bypass all current security measures and provide hackers with a contagious attack, capable of jumping over "air-gapped" networks...
Black Hat 2017
[PDF | Project Page | Video | PoC]
2.
BtleJuice: the Bluetooth Smart Man In The Middle Framework
Damiel Cauquil
A lot of Bluetooth Low Energy capable devices are spread since the last few years, offering a brand new way to compromise many “smart” objects: fitness wristbands, smart locks and padlocks and even healthcare devices. But this protocol poses some new challenges...
DefConference 2016 (DEFCOON)
[Video | PDF | Project Page]
3.
You had better secure your BLE devices
Damiel Cauquil
Sniffing and attacking Bluetooth Low Energy devices has always been a real pain. Proprietary tools do the job but cannot be tuned to fit our offensive needs, while opensource tools work sometimes, ...
DefConference 2018 (DEFCOON26)
[PDF | Project Page | Video]
4.
BLEEDINGBIT - Takeover of Aruba Access Point Access Point 325
Armis
In this demo, Armis will demonstrate the takeover of an Aruba Access Point Access Point 325 using a TI cc2540 BLE chip. For more information, please visit https://armis.com/bleedingbit.
BLEEDINGBIT RCE vulnerability (CVE-2018-16986)
[PDF | Project Page | Video]
5.
SweynTooth: Unleashing Mayhem over Bluetooth Low Energy
Matheus E. Garbelini
The Bluetooth Low Energy (BLE) is a promising short-range communication technology for Internet-of-Things (IoT) with reduced energy consumption. Vendors implement BLE protocols in their manufactured devices compliant to Bluetooth Core Specification. Recently, several vulnerabilities were discovered in the BLE protocol ...
USENIX Security 20
[PDF | Code | Project Page | Video | Slides]
6.
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
Jianliang Wu, Yuhong Nan ..., Purdue University
In this paper, we analyze the security of the BLE link-layer, focusing on the scenario in which two previously-connected devices reconnect. Based on a formal analysis of the reconnection procedure defined by the BLE specification, we highlight two critical security weaknesses in the specification. As a result, even a device implementing the BLE protocol correctly may be vulnerable to spoofing attacks...
WOOT '20
[PDF | Project Page | Video]
Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
Slawomir Jasek
Using a few simple tricks, we can assure the victim will connect to our impersonator device instead of the original one, and then just proxy the traffic - without consent of the mobile app or device. And here it finally becomes interesting - just imagine how many attacks you might be able to perform with the possibility to actively intercept the BLE communication....
Black Hat 2016 (Black Hat)
[Slides]
8.
BIAS: Bluetooth Impersonation AttackS
Daniele Antonioli, Nils Ole Tippenhauer & Kasper Rasmussen
The Bluetooth standard provides authentication mechanisms based on a long term pairing key, which are designed to protect against impersonation attacks. The BIAS attacks from our new paper demonstrate that those mechanisms are broken, and that an attacker can exploit them to impersonate any Bluetooth master or slave device. Our attacks are standard-compliant, and can be combined with other attacks, including the KNOB attack. In the paper, we also describe a low cost implementation of the attacks and our evaluation results on 30 unique Bluetooth devices using 28 unique Bluetooth chips.
📑 IEEE Symposium on Security and Privacy
[PDF | Project Page | Video | Slides | PoC]
9.
BLEKey: Breaking Access Controls With BLEKey
Eric Evenchick & Mark Baseggio
RFID access controls are broken. In this talk, we will demonstrate how to break into buildings using open-source hardware we are releasing.Over the years, we have seen research pointing to deficiencies in every aspect of access control systems: the cards...
Black Hat 2016 (Black Hat)
[PDF | Project Page | Video]
MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE
Yan Michalevsky
In this talk, we present new applications for cryptographic secret handshakes between mobile devices on top of Bluetooth Low-Energy (LE). Secret handshakes enable mutual authentication between parties that did not meet before (and therefore don't trust each other) but are both associated with a virtual secret group or community...
Black Hat 2016 (Black Hat)
[PDF | Project Page | Video]
11.
Safe Mode Wireless Village - The Basics Of Breaking BLE v3
FreqyXin
Evolving over the past twenty-two years, Bluetooth, especially Bluetooth Low Energy (BLE), has become the ubiquitous backbone ...
DefConference 2020 (DEFCOON)
[PDF | Project Page | Video]
12.
Key Negotiation Of Bluetooth (KNOB): Breaking Bluetooth Security
Daniele Antonioli, SUTD
We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allows a third party, without knowledge of any secret material (such as link and encryption keys), to make two (or more) victims agree on an encryption key with only 1 byte (8 bits) of entropy. Such low entropy enables the attacker to easily brute force the negotiated encryption keys, decrypt the eavesdropped ciphertext, and inject valid encrypted messages (in real-time)....
USENIX Security 19
[PDF | Project Page | Video | PoC]
Bluetooth Reverse Engineering: Tools and Techniques
Mike Ryan, Founder, ICE9 Consulting
With the continuing growth of IoT, more and more devices are entering the market with Bluetooth. This talk will shed some light on how these devices use Bluetooth and will cover reverse engineering techniques that in many cases can be accomplished with hardware you already have! Whether you're a Bluetooth newbie or a seasoned pro, you’ll learn something from this talk....
RSA Conference
[PDF | Project Page | Video]
14.
Apple bleee: What happens on your iPhone, stays on your iPhone
Jeremy Martin*, Douglas Alpuche, Kristina Bodeman
Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol ....
Apple bleee
[PDF | Project Page | Video | PoC | Analysis]
[research]: https://cdn4.iconfinder.com/data/icons/48-bubbles/48/12.File-32.png "Research"
[slides]: https://cdn3.iconfinder.com/data/icons/tango-icon-library/48/x-office-presentation-32.png "Slides"
[video]: https://cdn2.iconfinder.com/data/icons/snipicons/500/video-32.png "Video"
[web]: https://cdn3.iconfinder.com/data/icons/tango-icon-library/48/internet-web-browser-32.png "Website or blog post"
[code]: https://cdn2.iconfinder.com/data/icons/snipicons/500/application-code-32.png "Code"
[other]: https://cdn3.iconfinder.com/data/icons/tango-icon-library/48/emblem-symbolic-link-32.png "Uncategorized"### Legend:
|Type| Icon|
|---|---|
| Research | ![][research]|
| Slides | ![][slides] |
| Video | ![][video] |
| Website / Blog post | ![][web] |
| Code | ![][code]|
| Other | ![][other]|
## [▲](#table-of-content) Adversarial examples
| Type | Title| Categories |
|---|:---|---|
|![][video] | [BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device](https://www.youtube.com/watch?v=WWQTlogqF1I) | Black Hat 2017 |
|![][video] | [Hack.lu 2016 BtleJuice: the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil](https://www.youtube.com/watch?v=G08fh5Sa7TU)| Black Hat 2016 |
|![][video] | [MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE](https://www.youtube.com/watch?v=s79CG2Os0Nc)| Black Hat 2017 |
|![][video] | [Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing](https://www.youtube.com/watch?v=NDWGwrMk3AU)| Black Hat 2017 |
|![][video] | [Effective File Format Fuzzing – Thoughts, Techniques and Results](https://www.youtube.com/watch?v=qTTwqFRD1H8)| Black Hat 2016 |
|![][video] | [Hacking the Wireless World with Software Defined Radio - 2.0](https://www.youtube.com/watch?v=x3UUazj0tkg)| Black Hat 2014 |
|![][video] | [Hacking the Wireless World with Software Defined Radio - 2.0+](https://www.youtube.com/watch?v=MKbU3HhG2vk)| Black Hat 2015 |
|![][video] | [DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices](https://www.youtube.com/watch?v=VHJfd9h6G2s&t=646s)| DEFCON |
|![][video] | [DEF CON 24 Wireless Village - Jose Gutierrez and Ben Ramsey - How Do I BLE Hacking](https://www.youtube.com/watch?v=oP6sx2cObrY)| DEFCON |
|![][video] | [DEF CON Safe Mode Wireless Village - FreqyXin - The Basics Of Breaking](https://www.youtube.com/watch?v=X2ARyfjzxhY)| DEFCON |
|![][video] | [DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit](https://www.youtube.com/watch?v=O-caTVpHWoY)| DEFCON |
|![][video] | [DEF CON 26 WIRELESS VILLAGE - ryan holeman - BLE CTF](https://www.youtube.com/watch?v=lx5MAOyu9N0)| DEFCON |
|![][video] | [DEF CON 21 - Ryan Holeman - The Bluetooth Device Database](https://www.youtube.com/watch?v=BqiIERArnA8)| DEFCON |
|![][video] | [DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems](https://www.youtube.com/watch?v=85uwy0ACJJw)| DEFCON |
|![][video] | [KnighTV Episode 11: Hacking BLe Devices Part 1/6: Attacking August Smart Lock Pro](https://www.youtube.com/watch?v=3e4DBk5BKLg)| Tutorial |
|![][video] | [Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool](https://www.youtube.com/watch?v=uKqdb4lF0XU&list=LLxFkZjbpt0KyhEv1d342SQQ&index=6)| Black Hat 2016 |
|![][video] | [Bluetooth Reverse Engineering: Tools and Techniques](https://www.youtube.com/watch?v=gCQ3iSy6R-U)| RSA Conference 2019 |
|![][video] | [Hopping into Enterprise Networks from Thin Air with BLEEDINGBIT](https://www.youtube.com/watch?v=ASod9cRtZf4)| RSA Conference 2019 |
|![][research] | 漏洞预警 \| BleedingBit蓝牙芯片远程代码执行漏洞 [解读1](https://www.anquanke.com/post/id/163307) \| [解读2](https://www.secpulse.com/archives/78841.html)| Analysis |
|![][video] | [BA03 Breaking the Teeth of Bluetooth Padlocks Adrian Crenshaw](https://www.youtube.com/watch?v=k8Tp5hj6ylY)| ShowMeCon 2016 |
|![][video] | [The NSA Playset Bluetooth Smart Attack Tools](https://www.youtube.com/watch?v=_Z4gYyrKVFM)| DEFCON |## [▲](#table-of-content) To-Do
- 2020.10 BleedingTooth CVE-2020-12351 CVE-2020-12352 CVE-2020-24490
- 2020.04 BIAS CVE-2020-10135
- 2020.03 Bluewave CVE-2020-3848 CVE-2020-3849 CVE-2020-3850
- 2020.03 BLURtooth CVE-2020-15802
- 2020.03 BLESA CVE-2020-9770
- 2020.03 KNOB CVE-2019-9506## Code of Conduct
[免责申明 Code of Conduct](Code-of-Conduct.md)
## Citation
Use this bibtex to cite this repository:
```
@misc{BLE Security,
title={Bluetooth LE-Security: Method, Tools and Stack},
author={Charmve},
year={2020.09},
publisher={Github},
journal={GitHub repository},
howpublished={\url{https://github.com/Charmve/BLE-Security-Attack-Defence}},
}
```
*updade on 2021/08/05 @ Charmve