Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/mailinneberg/BlueBorne

Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
https://github.com/mailinneberg/BlueBorne

Last synced: 15 days ago
JSON representation

Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.

Awesome Lists containing this project

README

        

# BlueBorne
[![Donate](https://img.shields.io/badge/Donate-PayPal-green.svg)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=L2B2WU2L67XP8)
- Join or Ask: [email protected]
- New Full: https://youtu.be/qTy5aC34GqI
- BlueBorne: https://goo.gl/PSDuwY | Youtube: https://youtu.be/FJGGMyg0W38
- Broadpwn: https://goo.gl/xWC4hg | Youtube: https://youtu.be/GTb4Y2Y9shw
- Yalu Jailbreak iOS 10.3.1 : https://goo.gl/9cSSPU

- Help PR.

# CVE-2017-0785 STEP 1

Now at this point, I am wondering if Armis left this information out of the white paper intentionally, if you send more packets to the device you can dump a lot more memory, and in this memory, you will see some interesting things. They say you can find "encryption key, address space and valuable pointers (of code and or data) that can be used to bypass ASLR while exploiting a separate memory corruption vulnerability", so let's see what I found!

[![IMAGE ALT TEXT HERE](https://user-images.githubusercontent.com/29992468/32984048-b092df5e-ccaf-11e7-9faf-512dd4d59ead.png)](https://youtu.be/n13JtClFG2w)

### CVE-2017-0781 STEP 2 COMING SOON...

# To run, be sure to have pybluez and pwntools installed.
```
sudo apt-get install bluetooth libbluetooth-dev
sudo pip install pybluez
sudo pip install pwntools
```
[![IMAGE ALT TEXT HERE](https://user-images.githubusercontent.com/29992468/31075065-6300835c-a77c-11e7-88ae-42bc89c33084.png)](https://youtu.be/qTy5aC34GqI)

The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.

# Introduction to Bluetooth

Bluetooth is the leading and most widespread protocol for short-range communications. According to estimates , more than 8.2 billion Bluetooth devices are currently in use, and the number grows by the day. Bluetooth is implemented in a very wide range of devices, from the most popular consumer products (Smartphones, Wearables), to the most common appliances in enterprises (PCs, Smart TVs, Printers), and even in the critical infrastructure of our lives - medical appliances, cars, and many more. Bluetooth is managed, licensed and maintained by the Bluetooth Special Interests Group (SIG), which includes members from several large technology companies such as Microsoft, Intel, Apple, IBM, and more.
Though it was first introduced to the world in 1998, Bluetooth continues to develop with BLE and Mesh topology as the most interesting examples. BLE (Bluetooth Low Energy) is the cool new variant of Bluetooth, and is rapidly gaining ground in the market as it allows a new generation of devices, such as “smart” sensors and remote controls, which have limited power supply and bandwidth to connect to existing Bluetooth devices such as smartphones and PCs. Aside from BLE, a new feature was introduced in Bluetooth 5.0 - Bluetooth Mesh. This new feature changes the topology of Bluetooth connections by allowing low level devices to interconnect and form larger networks with a more elaborate and dense structure. The linked nature of the Mesh topology enables a Bluetooth network to spread far and wide and allow devices on the far ends of it to communicate. This new feature is an attempt by the Bluetooth SIG to compete with other rising short-range wireless protocols (like Zigbee, Z-Wave, LoRa and others) in handling the ever expanding realm of smart IoT devices and its unique requirements.
The recent developments in Bluetooth, together with its long history, are what make this protocol the backbone of short range connectivity in the vast majority of devices in the market. The growing reliance on wireless connectivity throughout our lives is likely to turn this protocol into an even bigger part of them, and of the devices we use.

[![IMAGE ALT TEXT HERE](https://user-images.githubusercontent.com/29992468/31075239-387de20e-a77d-11e7-9335-1671ef70b855.png)](https://youtu.be/FJGGMyg0W38)