Btlejacking Attack Could Allow a Hacker to Jam and Takeover the Bluetooth Connection
In Summary : The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout betw...
https://updatesinfosec.blogspot.com/2018/08/btlejacking-attack-could-allow-hacker.html
In Summary :
The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected devices. The supervision timeout defines the time after which the connection is if no valid packets have been received. Security researcher Damien Cauquil reveal the attack on Aug. 11 Defcon hacker conference and also he [...]
kindly refer the following link as follow up :
https://gbhackers.com/btlejacking-attack-allow/
The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected devices. The supervision timeout defines the time after which the connection is if no valid packets have been received. Security researcher Damien Cauquil reveal the attack on Aug. 11 Defcon hacker conference and also he [...]
kindly refer the following link as follow up :
https://gbhackers.com/btlejacking-attack-allow/
