BLE Deep Dive
The Philosophy: "Full Stack" Exploitation
The Roadmap: Your Attack Vector
+---------------------------------------+
| APPLICATION LAYER | <- Your Business Logic & UIs
+---------------------------------------+
^ |
+---------------------------------------+
| GATT / ATT | <- Data Model & Read/Write Ops
+---------------------------------------+
^ |
+---------------------------------------+
| SMP (Security Manager) | <- Pairing, Encryption, Keys
+---------------------------------------+
^ |
+---------------------------------------+
| L2CAP (Logical Link Control) | <- Multiplexing & Segmentation
+---------------------------------------+
^ |
+---------------------------------------+
| LINK LAYER (LL) | <- State Machine, Hopping, Timing
+---------------------------------------+
^ |
+---------------------------------------+
| PHY LAYER (Radio) | <- Modulation, Frequencies, Power
+---------------------------------------+The Toolkit: What You Need
Ready?
Last updated