Workshop: Blue2thprinting: identifying the form and function of the Bluetooth devices

XENO KOVAH

Abstract

At this very moment you are enveloped in the warm glowing warming glow of dozens to hundreds of Bluetooth devices. Aren’t you curious what all those little critters are?! In this workshop we’ll use the Blue2thprinting tools to poke at these apparitions and get a sense of what they are and what they want from us!

Note: this workshop will require you to run a prepared Linux VMware VM, and plug in USB Bluetooth dongles for sending and receiving packets. Come with VMware installed, and a machine you're willing to plug USB devices into.

Workshop Outline

Blue2thprinting is Bluetooth-toothprinting - the act of creating a toothprint (2thprint) to identify distinct features of a Bluetooth device. These 2thprints help us determine information such as what type of Bluetooth chip it uses, what company makes it, what model it is, etc. Over the past year I have focused on Blue2thprinting as a way to approach vulnerability assessment of Bluetooth devices. Specifically, whether they are vulnerable to the over-the-air Bluetooth chip vulnerabilities found by Veronica Kovah and presented at BlackHat USA 2020.

This workshop serves as a preview of the 1-day Blue2thprinting class being developed for OpenSecurityTraining2 (ost2.fyi) by Xeno Kovah. This brief workshop will give you a basic introduction to what the built-in Linux tools do and don't give you, and how that information is combined with and supplemented by the customized Blue2thprinting tools, and wrapped into more human-understandable formatting.

The first 20 attendees who arrive will be provided with a preconfigured Linux VM where both the collection and analysis components are already set up, and the two USB dongles necessary to demonstrate improved capture capabilities. (Attendees after 20 can get the VM but will need to look over the shoulder of someone with the hardware.) The VM will also be pre-seeded with some real Bluetooth data from past security conferences I've attended (DEF CON, Hardwear.io, RingZer0 2022, etc), that can be explored at your leisure. You'll also get a chance to try out the brand new "BTIDALPOOL" crowdsourcing infrastructure, which lets folks submit or retrieve shared Bluetooth information from a central server.

In this workshop you’ll learn about and play around with the following:

Linux Bluetooth default tools:

  • hciconfig
  • bluetoothctl
  • btmon

Linux non-default tools:

  • Wireshark
  • gatttool
  • sdptool

Blue2thprinting software:

  • central_app_launcher2.py for coordinating active 2thprinting components
  • Sniffle for sniffing BLE or sending arbitrary BT Low Energy packets
  • Analysis scripts for post-processing log files and placing data into MySQL database
  • TellMeEverything.py to provide a nicer interface to the data in the local or remote BTIDALPOOL database

At the end of the workshop you’ll be cordially invited to join the BlueCrew, and be introduced into the wide world of open research questions that exist in the Bluetooth space, awaiting your collaboration.

Xeno and Veronica's BOOTSTRAP25 Training

All trainings come with complimentary access to our BOOTSTRAP25 event! Book a virtual or in-person trainings and get a taste of the others at BOOTSTRAP25!

Bluetooth Low Energy - Full Stack Attack
It’s pretty fun to hack things wirelessly. And hey, it turns out there’s literally *billions* of Bluetooth Low Energy (BLE) things sold per year, so let’s learn how to hack those!

In-Person Training | March 18-21

Xeno Kovah

Prior to working full time on OpenSecurityTraining2, Xeno worked at Apple designing architectural support for firmware security, and code auditing firmware security implementations. A lot of what he did revolved around adding secure boot support to the main and peripheral processors (e.g. the Broadcom Bluetooth chip.) He led the efforts to bring secure boot to Macs, first with T2-based Macs, and then with the massive architectural change of Apple Silicon Macs. Once the M1 Macs shipped, he left Apple to pursue the project he felt would be most impactful: creating free deep-technical online training material and growing the newly created OpenSecurityTraining 501(c)(3) nonprofit.

Great! Next, complete checkout for full access to Ringzer0
Welcome back! You've successfully signed in
You've successfully subscribed to Ringzer0
Success! Your account is fully activated, you now have access to all content
Success! Your billing info has been updated
Your billing was not updated