Skip to main content

Welcome to the BLE Security Testing Guide

This guide provides a systematic approach for security analysis of Bluetooth Low Energy (BLE) IoT devices.

What You Will Learn

PhaseContentResult
Phase 1Passive ReconnaissanceDevice Profile, PCAP
Phase 2Active AnalysisGATT Database, Security Matrix
Phase 3App AnalysisProtocol, Keys
Phase 4ExploitationWorking PoC
Phase 5ReportingSecurity Report

Target Audience

This guide is intended for:

  • 🎓 Students working on their thesis or research projects
  • 🔬 Security Researchers analyzing IoT devices
  • 👨‍💻 Developers wanting to build secure BLE devices
  • 🛡️ Penetration Testers expanding their skillset to IoT

Prerequisites

RequirementLevel
Linux/TerminalRequired
PythonRequired
BLE KnowledgeNot required (covered here!)
HardwarenRF52840 USB Dongle (~$10)

Real-World Examples

This guide is based on real security research:

🕶️ LED Glasses

  • Finding: Hardcoded AES-128 key
  • CVSS: 9.8 (Critical)
  • Impact: Full device control without app

💡 LED Strips

  • Finding: XOR "encryption" with hardcoded key
  • CVSS: 9.8 (Critical)
  • Impact: Any device controllable

⚖️ Smart Scale

  • Finding: Weight in unencrypted advertising
  • CVSS: 5.3 (Medium)
  • Impact: Privacy violation for anyone in 10m range

Quick Start

# 1. Hardware: nRF52840 USB Dongle (~$10)

# 2. Install software
pip install blatann pycryptodome

# 3. Start scanning
python3 scanner.py /dev/ttyACM0
SectionContent
📘 TutorialsStep-by-step guide
🧠 ReferenceBLE fundamentals
📂 DownloadsScripts, Templates

Next Step

Continue with Prerequisites.