Black Hills InfoSec - Machine-in-the-Middle (MitM) BLE Attack
Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of attack technique, namely a relay attack. The relay attack is a form of MitM attack, not to be confused with the more well-known replay attack. […]
The post Machine-in-the-Middle (MitM) BLE Attack appeared first on Black Hills Information Security.
from Black Hills Information Security https://www.blackhillsinfosec.com/machine-in-the-middle-mitm-ble-attack/
Comments
Post a Comment