We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Wireless Keystroke Injection via Bluetooth Low Energy

00:00

Formal Metadata

Title
Wireless Keystroke Injection via Bluetooth Low Energy
Title of Series
Number of Parts
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
We present a Microsoft Windows vulnerability that allows a remote attacker to impersonate a Bluetooth Low Energy (BLE) keyboard and perform Wireless Key Injection (WKI) on its behalf. It can occur after a legitimate BLE keyboard automatically closes its connection because of inactivity. In that situation, an attacker can impersonate it and wirelessly send keys. In this talk we will demonstrate the attack live and we will explain the theoretical basis behind it and the process that led us to discover the vulnerability. We will also release the tool that allows to reproduce the attack and we will detail how to use it.
Vulnerability (computing)PlastikkarteKeyboard shortcutWindowVideoconferencingDemo (music)Revision controlDecision tree learningComputer animation
Keyboard shortcutSoftware protection dongleGraphics tabletConnected spaceRootMaxima and minimaPhysical systemSigma-algebraMultitier architectureKeyboard shortcutWindowCuboidSpacetimeConnected spaceOperating systemDifferent (Kate Ryan album)Flow separationCartesian coordinate systemEncryptionFirmwareMereologyImplementationLink (knot theory)Configuration spaceTelecommunicationGame controllerVideoconferencingMultiplication signProcedural programmingCommunications protocolAssociative propertySoftware protection dongleAttribute grammarComputer-assisted translationOSI modelSet (mathematics)Object (grammar)Descriptive statisticsComputer hardwareExploit (computer security)Order (biology)Theory of relativitySoftwareVirtual machineLatent heatState of matterInformation securityException handlingPoint (geometry)Moment (mathematics)InformationFood energyVulnerability (computing)Presentation of a groupDigital photographyEvent horizonEndliche ModelltheorieNumbering schemeProof theoryComputer animation
EncryptionMaxima and minimaRegulärer Ausdruck <Textverarbeitung>Division (mathematics)Menu (computing)Gamma functionLink (knot theory)Vector spaceOSI modelControl flowRandom numberField (computer science)Sheaf (mathematics)MereologyLimit (category theory)MathematicsVulnerability (computing)Convex hullLink (knot theory)Message passingAuthenticationKey (cryptography)EncryptionStandard deviationContext awarenessConnected spaceDependent and independent variablesSlide rulePoint (geometry)MereologyState of matterMultiplication signCorrespondence (mathematics)Vulnerability (computing)Vector spacePrice indexOrder (biology)Procedural programmingEvent horizonMathematicsLevel (video gaming)WindowQueue (abstract data type)CASE <Informatik>Communications protocolWritingRandom number generationLatent heatComputer animation
Control flowFood energyOSI modelFrame problemInformationCommunications protocolAttribute grammarOpcodeEmailAddress spaceConvex hullMessage passingWorld Wide Web ConsortiumDirection (geometry)CodeAddress spaceEncryptionMessage passingOpen sourceConnected spaceLink (knot theory)Direction (geometry)Level (video gaming)MereologyGame controllerNumberCommunications protocolFunctional (mathematics)Multiplication signDependent and independent variablesCausalityObject (grammar)State of matterNormal (geometry)Stack (abstract data type)ImplementationPrice indexPoint (geometry)FirmwareOrder (biology)Greatest elementKeyboard shortcutFood energyMotion captureHoaxTelecommunicationDataflowHookingSoftware frameworkReading (process)Slide ruleAuthenticationDivisorComputer animation
GEDCOMCommunications protocolDependent and independent variablesReading (process)Game controllerAlgorithmic information theoryVoltmeterFood energyEmailData typeAddress spaceFlagLatent heatLengthBroadcasting (networking)CAN busCyclic redundancy checkFrame problemOSI modelInformationKeyboard shortcutReal-time operating systemConnected spaceOrder (biology)Limit (category theory)Demo (music)Computer file2 (number)ImplementationConfiguration spaceSoftware protection dongleCharacteristic polynomialDirection (geometry)Loop (music)Multiplication signDivisorAsynchronous Transfer ModePrice indexAddress spaceProof theoryRight angleKeyboard shortcutMessage passingElectronic mailing listWindowAttribute grammarType theoryOperator (mathematics)InjektivitätData structureCASE <Informatik>Traffic reportingPlastikkarteDependent and independent variablesGroup actionParameter (computer programming)Scripting languageFood energyComputer programmingCodeWritingComputer configurationSoftware testingVideoconferencingOpcodeSystem identificationFirmwareComputer animation
VacuumGamma functionKeyboard shortcutConvex hullEvent horizonSoftware protection dongleView (database)File formatProcess (computing)Keyboard shortcutVirtual machineDemo (music)Medical imagingFrequencyPoint (geometry)Message passingMultiplication signWindowConnected spaceProof theoryCASE <Informatik>Power (physics)Software protection dongleMalwareFood energyComputer animation
Vulnerability (computing)MereologyReal-time operating systemConnected spaceWindowPoint (geometry)CASE <Informatik>Demo (music)BlogPhysical systemPatch (Unix)Computer programmingSquare numberCuboidWeb pageProof theoryFirmwareKeyboard shortcutFile formatSoftware bugMalwareProjective plane2 (number)Vulnerability (computing)Virtual machineMultiplication signComputer animation
Transcript: Englisch(auto-generated)