InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Exploring the Capabilities of Flipper Zero and Ubertooth One: Essential Tools for Wireless Security Testing (Part 2)

Jason Yee
InfoSec Write-ups
Published in
4 min readJul 24, 2023

--

Ubertooth One

Image of Ubertooth One

What is BLE?

Capturing BLE w/Wireshark

Other Information

How can BLE Exploitation and Sniffing be prevented?

Encryption

Authentication

Obfuscation

Regular Firmware Updates

Monitoring

Physical Security

Using Specialized Hardware

Conclusion

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Jason Yee

👋🏻 IBDP Student, Front-End & AI Development. Cybersecurity Research tech.withjasony.com

No responses yet

Write a response