TL;DR: I will demonstrate wirelessly injecting keystrokes into multiple major and widely used operating systems (OS identities pending responsible disclosure currently in progress).
This talk is a part of the NSA Playset series, a collection of unique topics with a common theme: implementing the NSA’s toys as found in the NSA ANT catalog. Other Playset presentations and tools include TWILIGHTVEGETABLE, an automated tool for GSM surveillance, and SLOTSCREAMER, a device for accessing memory via exposed buses on modern PCs. I have developed multiple Bluetooth Smart (BLE) attack tools, inspired by capabilities likely to be present in the ANT catalog.
I will cover the following:
– BLE keystroke injection
– remote keystroke surveillance
– low level attacks against BLE chips
– fuzzing at the stack and application level
These are all capabilities likely to be leveraged by the NSA against SIGINT targets.