Difference between revisions of "BLE-Berry Project"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 1: Line 1:
== Summary ==  
== Summary ==  


This Project is the result of a master’s thesis that created a Threat Model of the Bluetooth Low Energy (BLE) Standard and developing a tool to enable easier BLE Development and to perform basic pentesting operations.
This Project is the result of a master’s thesis that created a Threat Model of the Bluetooth Low Energy (BLE) Standard and developing a tool called BLE Berry to enable easier BLE Development and to perform basic pentesting operations.


== Requirements ==


* Operating system: Ubuntu 18.04 bionic amd64
== Threat Model ==
* Packages: git emacs


In order to complete these steps, you must have followed [[Some Other Documentation]] before.
The Threat Model was performed by analyzing the BLE portion of the BLE Standard and gathering further information's from numerous white papers and scientific papers. The gathered Threats and Vulnerabilities got mapped to the Layer/Protocol they are performed on, as shown in the figure below.
 
xxxxx Image of Threatmodel xxxxx
 
Some of the Threats have use other Threats as an entry vector, e.g., a machine-in-the-middle attack rely
 
 
The Threat Model is based on the STRIDE Method


== Description ==


=== Step 1 ===
=== Step 1 ===

Revision as of 18:35, 2 October 2023

Summary

This Project is the result of a master’s thesis that created a Threat Model of the Bluetooth Low Energy (BLE) Standard and developing a tool called BLE Berry to enable easier BLE Development and to perform basic pentesting operations.


Threat Model

The Threat Model was performed by analyzing the BLE portion of the BLE Standard and gathering further information's from numerous white papers and scientific papers. The gathered Threats and Vulnerabilities got mapped to the Layer/Protocol they are performed on, as shown in the figure below.

xxxxx Image of Threatmodel xxxxx

Some of the Threats have use other Threats as an entry vector, e.g., a machine-in-the-middle attack rely


The Threat Model is based on the STRIDE Method


Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References