Pablo González Pérez
We are finding more and more devices connected around us. BLE (#Bluetooth Low-Energy) technology is increasingly distributed and can be found at home, in the office and on the street. It is a technology that simplifies the use of Bluetooth and makes it more efficient. Energy saving can be faced with security and the lack of standardization in many cases, causes us to find weaknesses and #attack vectors that can be used to obtain information from a device, manipulation of it or that the device performs an action for which it was not designed or for which it was not authorized. This workshop will demonstrate techniques for auditing these devices. Totally practical. We will use MicroBit.