Edit 1: Owing to the available resources on BlueBorne, this will mostly be a theoretical session.


BlueBorne is an attack vector recently identified by security researchers Ben Seri and Gregory Vishnepolsky from Armis Lab. This attack vectors is a collection of multiple zero days hence making most Bluetooth enabled devices vulnerable.

Unlike traditional Bluetooth based attacks, this kill chain doesn't require the target device to be on discoverable mode nor it requires it to be paired with the attacking device.

This session will focus on the details released by Armis on BlueBorne and any related exploits that have been made public.

Available Resources

Armis lab has made the following resources available to the public:

1) BlueBorne Security Scanner: An android app which claims to detect vulnerable devices.
2) [A Technical White Paper](http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf)
3)  [![BlueBorne Explained](http://img.youtube.com/vi/LLNtZKpL0P8/0.jpg)](http://www.youtube.com/watch?v=LLNtZKpL0P8)

^ Assume that the Markdown has been rendered. :)



I am a Freelance Cyber Security Consultant and Trainer.

You can talk to me about:
1) Penetration Testing
2) Cloud and Infrastructure Security
3) Privacy


Starts at Saturday October 14 2017, 10:50 AM. The sessions runs for 30 minutes.