• Stars
    star
    264
  • Rank 155,103 (Top 4 %)
  • Language
    Python
  • License
    BSD 2-Clause "Sim...
  • Created about 4 years ago
  • Updated 9 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.

Bluetooth-LE Security: Method, Tools and Stack

B1ueB0y github Code-of-Conduct


News!

  •   2020.10.13: A heap-based type confusion affecting Linux kernel 4.8 and higher was discovered in net/bluetooth/l2cap_core.c. by Google Security Research !
  •   2020.03.26: A memory corruption issue was addressed with improved input validation by Qihoo 360 Alpha Lab !


 

Figure 1: BLE messages exchange diagram
🔥Among the top 10 BLE repos on GitHub

Fuzzing
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
Stateful Black-Box Fuzzing of BLE Devices Using Automata Learning
BRAKTOOTH: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing
Towards Automated Fuzzing of 4G/5G Protocol Implementations Over the Air.
more ...

BLE Vulnerability TOP5




Table of Content

📂 BLE-Security-Attack&Defence
 |-- 📂 BLE Vulnerability TOP5
 |  |-- 📂 BlueBorne
 |  |-- 📂 BleedingBit
 |  |-- 📂 SweynTooth
 |  |-- 📂 BtleJuice
 |  |-- 📂 BLE-CTF
 |-- 📂 ble-stack
 |  |-- 📂 Mynewt-Nimble
 |  |-- 📂 nRF5_SDK_15.0.0_a53641a
 |  |-- 📂 PyBluez
 |  |-- 📂 LightBlue
 |-- 📂 cap - capture package
 |  |-- 📂 CrackLE
 |  |-- 📂 TI-BLTE2Pcap
 |  |-- 📂 blefuzz_V21
 |  |-- 📂 Fuzzing Bluetooth
 |-- 📂 image
 |-- 📂 tools - hardware&sofrware
 |  |-- 📂 Ubertooth
 |  |-- 📂 GATTacker
 |  |-- 📂 BladeRF
 |  |-- 📂 HackRF
 |  |-- 📂 Adafruit-BluefruitLE
 ...

Bluetooth LE Vulnerabilities

1. BlueBorne: A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device

BlueBorne: A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device
Ben Seri & Gregory Vishnepolsky

In this talk we will present the ramifications of airborne attacks, which bypass all current security measures and provide hackers with a contagious attack, capable of jumping over "air-gapped" networks...

Black Hat 2017
[PDF | Project Page | Video | PoC]

2. BtleJuice: the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil

BtleJuice: the Bluetooth Smart Man In The Middle Framework
Damiel Cauquil

A lot of Bluetooth Low Energy capable devices are spread since the last few years, offering a brand new way to compromise many “smart” objects: fitness wristbands, smart locks and padlocks and even healthcare devices. But this protocol poses some new challenges...

DefConference 2016 (DEFCOON)
[Video | PDF | Project Page]

3. Damien virtualabs Cauquil - You had better secure your BLE devices

You had better secure your BLE devices
Damiel Cauquil

Sniffing and attacking Bluetooth Low Energy devices has always been a real pain. Proprietary tools do the job but cannot be tuned to fit our offensive needs, while opensource tools work sometimes, ...

DefConference 2018 (DEFCOON26)
[PDF | Project Page | Video]

4. BLEEDINGBIT - Takeover of Aruba Access Point Access Point 325

BLEEDINGBIT - Takeover of Aruba Access Point Access Point 325
Armis

In this demo, Armis will demonstrate the takeover of an Aruba Access Point Access Point 325 using a TI cc2540 BLE chip. For more information, please visit https://armis.com/bleedingbit.

BLEEDINGBIT RCE vulnerability (CVE-2018-16986)
[PDF | Project Page | Video]

5. SweynTooth: Unleashing Mayhem over Bluetooth Low Energy

SweynTooth: Unleashing Mayhem over Bluetooth Low Energy
Matheus E. Garbelini

The Bluetooth Low Energy (BLE) is a promising short-range communication technology for Internet-of-Things (IoT) with reduced energy consumption. Vendors implement BLE protocols in their manufactured devices compliant to Bluetooth Core Specification. Recently, several vulnerabilities were discovered in the BLE protocol ...

USENIX Security 20
[PDF | Code | Project Page | Video | Slides]

6. BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy

BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
Jianliang Wu, Yuhong Nan ..., Purdue University

In this paper, we analyze the security of the BLE link-layer, focusing on the scenario in which two previously-connected devices reconnect. Based on a formal analysis of the reconnection procedure defined by the BLE specification, we highlight two critical security weaknesses in the specification. As a result, even a device implementing the BLE protocol correctly may be vulnerable to spoofing attacks...

WOOT '20
[PDF | Project Page | Video]

7. Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool

Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
Slawomir Jasek

Using a few simple tricks, we can assure the victim will connect to our impersonator device instead of the original one, and then just proxy the traffic - without consent of the mobile app or device. And here it finally becomes interesting - just imagine how many attacks you might be able to perform with the possibility to actively intercept the BLE communication....

Black Hat 2016 (Black Hat)
[Slides]

8. BIAS: Bluetooth Impersonation AttackS

BIAS: Bluetooth Impersonation AttackS
Daniele Antonioli, Nils Ole Tippenhauer & Kasper Rasmussen

The Bluetooth standard provides authentication mechanisms based on a long term pairing key, which are designed to protect against impersonation attacks. The BIAS attacks from our new paper demonstrate that those mechanisms are broken, and that an attacker can exploit them to impersonate any Bluetooth master or slave device. Our attacks are standard-compliant, and can be combined with other attacks, including the KNOB attack. In the paper, we also describe a low cost implementation of the attacks and our evaluation results on 30 unique Bluetooth devices using 28 unique Bluetooth chips.

📑 IEEE Symposium on Security and Privacy
[PDF | Project Page | Video | Slides | PoC]

9. BLEKey: Breaking Access Controls With BLEKey

BLEKey: Breaking Access Controls With BLEKey
Eric Evenchick & Mark Baseggio

RFID access controls are broken. In this talk, we will demonstrate how to break into buildings using open-source hardware we are releasing.Over the years, we have seen research pointing to deficiencies in every aspect of access control systems: the cards...

Black Hat 2016 (Black Hat)
[PDF | Project Page | Video]

10. MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE

MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE
Yan Michalevsky

In this talk, we present new applications for cryptographic secret handshakes between mobile devices on top of Bluetooth Low-Energy (LE). Secret handshakes enable mutual authentication between parties that did not meet before (and therefore don't trust each other) but are both associated with a virtual secret group or community...

Black Hat 2016 (Black Hat)
[PDF | Project Page | Video]

11. Safe Mode Wireless Village - The Basics Of Breaking BLE v3

Safe Mode Wireless Village - The Basics Of Breaking BLE v3
FreqyXin

Evolving over the past twenty-two years, Bluetooth, especially Bluetooth Low Energy (BLE), has become the ubiquitous backbone ...

DefConference 2020 (DEFCOON)
[PDF | Project Page | Video]

12. USENIX Security '19 - The KNOB is Broken: Exploiting Low Entropy in the Encryption Key

Key Negotiation Of Bluetooth (KNOB): Breaking Bluetooth Security
Daniele Antonioli, SUTD

We present an attack on the encryption key negotiation protocol of Bluetooth BR/EDR. The attack allows a third party, without knowledge of any secret material (such as link and encryption keys), to make two (or more) victims agree on an encryption key with only 1 byte (8 bits) of entropy. Such low entropy enables the attacker to easily brute force the negotiated encryption keys, decrypt the eavesdropped ciphertext, and inject valid encrypted messages (in real-time)....

USENIX Security 19
[PDF | Project Page | Video | PoC]

13. Bluetooth Reverse Engineering: Tools and Techniques

Bluetooth Reverse Engineering: Tools and Techniques
Mike Ryan, Founder, ICE9 Consulting

With the continuing growth of IoT, more and more devices are entering the market with Bluetooth. This talk will shed some light on how these devices use Bluetooth and will cover reverse engineering techniques that in many cases can be accomplished with hardware you already have! Whether you're a Bluetooth newbie or a seasoned pro, you’ll learn something from this talk....

RSA Conference
[PDF | Project Page | Video]

14. Apple bleee

Apple bleee: What happens on your iPhone, stays on your iPhone
Jeremy Martin*, Douglas Alpuche, Kristina Bodeman

Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol ....

Apple bleee
[PDF | Project Page | Video | PoC | Analysis]


Legend:

Type Icon
Research
Slides
Video
Website / Blog post
Code
Other

Adversarial examples

Type Title Categories
BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device Black Hat 2017
Hack.lu 2016 BtleJuice: the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil Black Hat 2016
MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE Black Hat 2017
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing Black Hat 2017
Effective File Format Fuzzing – Thoughts, Techniques and Results Black Hat 2016
Hacking the Wireless World with Software Defined Radio - 2.0 Black Hat 2014
Hacking the Wireless World with Software Defined Radio - 2.0+ Black Hat 2015
DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices DEFCON
DEF CON 24 Wireless Village - Jose Gutierrez and Ben Ramsey - How Do I BLE Hacking DEFCON
DEF CON Safe Mode Wireless Village - FreqyXin - The Basics Of Breaking DEFCON
DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit DEFCON
DEF CON 26 WIRELESS VILLAGE - ryan holeman - BLE CTF DEFCON
DEF CON 21 - Ryan Holeman - The Bluetooth Device Database DEFCON
DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems DEFCON
KnighTV Episode 11: Hacking BLe Devices Part 1/6: Attacking August Smart Lock Pro Tutorial
Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool Black Hat 2016
Bluetooth Reverse Engineering: Tools and Techniques RSA Conference 2019
Hopping into Enterprise Networks from Thin Air with BLEEDINGBIT RSA Conference 2019
漏洞预警 | BleedingBit蓝牙芯片远程代码执行漏洞 解读1 | 解读2 Analysis
BA03 Breaking the Teeth of Bluetooth Padlocks Adrian Crenshaw ShowMeCon 2016
The NSA Playset Bluetooth Smart Attack Tools DEFCON

To-Do

  • 2020.10 BleedingTooth CVE-2020-12351 CVE-2020-12352 CVE-2020-24490
  • 2020.04 BIAS CVE-2020-10135
  • 2020.03 Bluewave CVE-2020-3848 CVE-2020-3849 CVE-2020-3850
  • 2020.03 BLURtooth CVE-2020-15802
  • 2020.03 BLESA CVE-2020-9770
  • 2020.03 KNOB CVE-2019-9506

Code of Conduct

免责申明 Code of Conduct

Citation

Use this bibtex to cite this repository:

@misc{BLE Security,
  title={Bluetooth LE-Security: Method, Tools and Stack},
  author={Charmve},
  year={2020.09},
  publisher={Github},
  journal={GitHub repository},
  howpublished={\url{https://github.com/Charmve/BLE-Security-Attack-Defence}},
}

*updade on 2021/08/05 @ Charmve

More Repositories

1

Surface-Defect-Detection

📈 目前最大的工业缺陷检测数据库及论文集 Constantly summarizing open source dataset and critical papers in the field of surface defect research which are of great importance.
Python
2,698
star
2

computer-vision-in-action

A computer vision closed-loop learning platform where code can be run interactively online. 学习闭环《计算机视觉实战演练:算法与应用》中文电子书、源码、读者交流社区(持续更新中 ...) 📘 在线电子书 https://charmve.github.io/computer-vision-in-action/ 👇项目主页
Jupyter Notebook
2,375
star
3

CppMaster

C++ Master Learning Roadmap, especially for AIoT and C++ advanced SWE
C++
262
star
4

Practicum4ECE

「一名普通电子信息本科生的项目实践管理」将大学阶段的实训内容,按照专业课程设计(包括上机实验、课程设计、下学年的毕业设计等)、竞赛项目、科创项目、小型编程项目这四个门类进行整理汇总。
C
113
star
5

LeetCode4FLAG

🔥 🔥 High frequent interview LeetCode 100 for FaceBook,Linkedin,Amazon,Google,Microsoft. More importantly, the problems' solutions are provided,include C++, Python and Java.
C++
110
star
6

VOGUE-Try-On

Personal repository for "VOGUE: Try-On by StyleGAN Interpolation Optimization" (CVPR 2021). SOTA results for garments to deform according to the given body shape, while preserving pattern and material details.
HTML
89
star
7

OpenCC

Automatic driving long tail / corner cases scenarios dataset (Anomaly detection)
87
star
8

awesome-scene-text-detection

Tracking the latest progress in Scene Text Detection and Recognition: Must-read papers well organized with code and dataset
75
star
9

OccNet-Course

国内首个占据栅格网络全栈课程《从BEV到Occupancy Network,算法原理与工程实践》,包含端侧部署。Surrounding Semantic Occupancy Perception Course for Autonomous Driving (docs, ppt and source code) 课程主页:http://111.229.117.200:7001/
Python
75
star
10

Mirror-Glass-Detection

🍸 Mirror & Glass Detection in Real-world Scenes
Python
72
star
11

PaperWeeklyAI

📚「@MaiweiAI」Studying papers in the fields of computer vision, NLP, and machine learning algorithms every week.
Jupyter Notebook
63
star
12

OpenCS-Courses

🎓 Path to a free self-taught education in Computer Science!
58
star
13

Awesome-Lane-Detection

A paper list with code of lane detection.
Python
52
star
14

Semantic-Segmentation-PyTorch

PyTorch implementation for Semantic Segmentation, include FCN, U-Net, SegNet, GCN, PSPNet, Deeplabv3, Deeplabv3+, Mask R-CNN, DUC, GoogleNet, and more dataset
Python
48
star
15

autopilot-perception

End to End Autopilot Perception Playbook
HTML
46
star
16

iQuant

HTML
40
star
17

LightCube

A Design of 3D Dynamic Display System Based on Voice Control. ✨ Purpose only! Copyright and commercial use rights are received.
C
40
star
18

Charmve

🤡 About Me.
Python
38
star
19

PyStegosploit

PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
HTML
37
star
20

transparent-object-segmentation

💎 Transparent objects such as windows and bottles made by glass widely exist in the real world. Segmenting transparent objects is challenging because these objects have diverse appearance inherited from the image background, making them had similar appearance with their surroundings.
32
star
21

TimeWarp

🐶 「Updating ...」Replacing Real-Time the High-Resolution Meeting Background Freely
Python
29
star
22

StegaStamp-plus

Improved the original repo, 'Invisible Hyperlinks in Physical Photographs', embedded with longer string than the original
Jupyter Notebook
25
star
23

SNE-RoadSeg2

🌱 SNE-RoadSeg in PyTorch, ECCV 2020 by Rui (Ranger) Fan & Hengli Wang, but now we have improved it.
Python
24
star
24

AccANN

🐆 A compiler from AI model to RTL (Verilog) accelerator in FPGA hardware with auto design space exploration for *AdderNet*
15
star
25

AR-DAO

AR-DAO,A decentralized autonomous organization (DAO) that enables users to forge NFTs through augmented reality (AR) and participate in various gaming and social activities. 一个让用户通过增强现实(AR)铸造NFT并参与不同游戏等社交活动的去中心化自治组织(DAO)https://github.com/Charmve/AR-DAO/wiki
JavaScript
14
star
26

gpt-eyes

I GAVE GPT-4 EYES!
JavaScript
10
star
27

EmotionCube

🐾 EmotionCube: An intelligent companion robot is designed based on expression recognition and intelligent speech.
C
9
star
28

Charmve.github.io

I'm here! 👋 Personal Home Page 🐶
HTML
8
star
29

steganography.js

Hide secret messages with JavaScript with steganography.js
JavaScript
5
star
30

PuppyGo

vision language model and large language model powered embodied robot
5
star
31

NotOnlyPaper

PaperEasy = arXiv + code + video + tutorial + Colab/demo
JavaScript
5
star
32

AlphaFold-baseline

This package provides an basic implementation of the contact prediction network used in AlphaFold 1 for beginner, associated model weights and CASP13 dataset as used for CASP13 (2018) and published in Nature
Python
4
star
33

mapless-course

No HDMap, Only Vision Perception
4
star
34

Bluetooth-Location_2D

indoor position based-on Bluetooth low energy in 2d space
Java
3
star
35

B1ueB0y-BLE-Fuzzing

An awesome toolkit for testing the BLE device, chip and Protocol stack
2
star
36

jsFlow

🏄 A Lightweight Web Browser-based Machine Learning Framework
CSS
2
star
37

LocalPay

非接触式离线支持方案
1
star
38

NumPyCNN

Building Convolutional Neural Networks From Scratch using NumPy
Python
1
star
39

Less-is-More

🌈 Art of README in GitHub, #Less is More#.
1
star
40

ScenesGen

自动驾驶算法系列课程之《场景数据生成》
1
star
41

weather-app

SCSS
1
star
42

Wind-Pendulum-Controlling-System

2015年风力摆控制系统赛题(B题)解析+源代码开源 A Wind Pendulum Controlling System
1
star
43

SimElectronicGun

基于视觉感知的模拟电磁曲射炮 (2019年全国大学生电子设计竞赛H题) 全国二等奖作品
C
1
star
44

qbot_pro

Jupyter Notebook
1
star