What you’ll learn
- Understand Bluetooth fundamentals: Classic vs BLE, profiles (HID, A2DP, GATT), pairing, and security models.
- Set up and configure lab environments: Raspberry Pi 5, BlueZ tools, nRF52840, Arduino + NRF24L01, and relevant software.
- Perform basic and advanced scanning/enumeration to fingerprint devices and services.
- Design and run controlled Bluetooth DoS experiments and analyze their impact.
- Use nRF52840 for sniffing, role-emulation, and targeted interception in safe labs.
- Build and demo hardware tests (Arduino + NRF24L01 jammer) inside shielded enclosures.
- Implement mitigations and detection strategies to harden Bluetooth deployments.
- Follow legal, ethical, and safety best practices for offensive testing and responsible disclosure.
Description
Master practical Bluetooth offensive and defensive skills with this hands-on, lab-driven course designed for red-teamers, penetration testers, security researchers, and hardware security enthusiasts. You’ll move from clear foundational theory into realistic, mission-oriented exercises that mirror real engagement workflows: recon –>weaponized –> execute –>document –> remediate.The course begins with a concise introduction and a requirements checklist so you can prepare your lab (Raspberry Pi 5, USB Bluetooth adapters, nRF52840, Arduino + NRF24L01, and test mobile devices). Next we cover core theory — the key differences between Bluetooth Classic and BLE and the security implications of each — so you understand how attacks map to protocol specifics.
[/REPLY]