-
Book Overview & Buying
-
Table Of Contents
The Vulnerability Researcher's Handbook
By :
In September 2017, the security researchers working at Armis Labs published research on weaknesses in the Bluetooth protocol. They named these weaknesses and the associated vulnerabilities BlueBorne. BlueBorne vulnerabilities allow attackers to gain access to a device without the user’s knowledge or interaction. The attacker can then take complete control of the victim’s device. The researchers discovered that there were eight vulnerabilities in the Bluetooth protocol that could be exploited to carry out this kind of attack. These vulnerabilities affected all devices that use Bluetooth, including smartphones, laptops, and Internet of Things (IoT) devices. Their research was published in an extensive 41-page white paper, which gave background on the protocol running on approximately 8.2 billion devices worldwide. With this research paper, Armis helped lay the groundwork for modern-day Bluetooth research...
Change the font size
Change margin width
Change background colour