{"id":9584,"date":"2022-11-02T06:35:28","date_gmt":"2022-11-02T06:35:28","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/in-person-hands-on-hacking-for-ble-hitb2023ams\/"},"modified":"2023-04-18T06:26:37","modified_gmt":"2023-04-18T06:26:37","slug":"hands-on-hacking-for-ble-hitb2023ams","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/","title":{"rendered":"Hands-On Hacking for BLE [2-Day]"},"content":{"rendered":"<p>&nbsp;<\/p>\n<hr \/>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4 style=\"text-align: left\"><span style=\"color: #993300\"><em><strong>This 2-day BLE course is part of a 4-day BLE &amp; NFC\/RFID course.<\/strong><\/em><\/span><\/h4>\n<h5 style=\"text-align: left\"><span style=\"color: #993300\"><em><br \/>\n&#8211; To join the 2-day NFC\/RFID course instead, <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-nfc-rfid-hitb2023ams\/\"><strong>click here<\/strong>.<\/a><br \/>\n&#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-ble-nfc-rfid-4-day-combo-hitb2023ams\/\"><strong>click here<\/strong>.<\/a><br \/>\n&#8211; To join only this 2-day BLE class, read further below.<\/em><\/span><span style=\"color: #993300\"><em><br \/>\n<\/em><\/span><\/h5>\n<div>\n<hr \/>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h2><strong><span style=\"color: #993300\">REGISTRATION CLOSED<\/span><\/strong><\/h2>\n<h4><strong>DATE: 17-18 April 2023<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 CEST\/GMT+2<\/strong><\/h4>\n<\/div>\n<\/div>\n<table style=\"height: 126px\" width=\"669\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>17 Apr<\/td>\n<td>Monday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>18 Apr<\/td>\n<td>Tuesday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h5>Bluetooth Low Energy is one of the most common and rapidly growing IoT technologies. We are immersed in surrounding BLE signals: starting with recent COVID-19 contact tracing, through beacons, wearables, TVs, home appliances, toothbrushes, sex toys, up to smart locks, medical devices and banking tokens.<\/h5>\n<p>Unfortunately the prevalence of technology does not come with security. Alarming vulnerabilities are revealed day by day \u2013 not only in individual devices\u2019 implementations, but also generic: in the Bluetooth specification itself. And yet, the knowledge on how to comprehensively assess security of such devices still remains uncommon.<\/p>\n<p>This training aims to fill this gap, with the best possible methodology \u2013 a hands-on approach. Both training days are filled with multiple practical exercises covering BLE sniffing, MITM, relay, jamming, hijacking, cracking, and exploiting vulnerabilities of many real devices (dozens of smart locks, U2F and banking authentication tokens, mobile PoS, &#8230;). And what&#8217;s best: the hardware for practical exercises (sniffer, simulated devices, adapters, \u2026) &#8211; are included, which allows you to repeat the labs later. You will finish the training being able not only to fully assess and compromise BLE devices, but also with the equipment to do it.<\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h5><strong>Each student will receive<\/strong><\/h5>\n<ul>\n<li>Course materials \u2013 about 1000 pages, step by step instructions for hands-on exercies.<\/li>\n<li>All required additional files: source code, documentation, installation binaries, virtual machine images.<\/li>\n<li><strong><span style=\"color: #993300\">Included hardware pack<\/span><\/strong> for hands-on exercises, consisting of Bluetooth 4\/5 development boards, dedicated BLE device, hardware sniffer, USB dongles.<\/li>\n<li>Don&#8217;t have an Android phone? Sign up for both 2-day trainings (<a href=\"https:\/\/sectrain.hitb.org\/courses\/hands-on-hacking-for-ble-nfc-rfid-4-day-combo-hitb2022ams\/\"><strong>click here<\/strong><\/a>), and we&#8217;ll hook you up with an Android phone with Bluetooth 4 and NFC support!<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p><iframe title=\"#HITB2022AMS TRAINING - Hands-On Hacking for BLE &amp; NFC\/RFID (4-Day Combo)\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/pRoZciw3vc4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Agenda<br \/>\n<\/strong><\/h5>\n<h5><strong>Day 1<\/strong><\/h5>\n<hr \/>\n<p><strong>1. What is Bluetooth Low Energy, how it differs from previous Bluetooth versions \u2013 introduction.<\/strong><\/p>\n<p><strong>2. BLE advertisements, broadcasted packets<\/strong><br \/>\na) Theory &#8211; BLE advertisement packets<br \/>\nb) Scanning for nearby BLE devices\u2019 advertisements: smartphone, command-line, scripts, other tools.<br \/>\nc) BLE Beacons<\/p>\n<ul>\n<li>\u00a0iBeacon, Eddystone<\/li>\n<li>\u00a0Spoofing\/cloning beacons to get rewards, free beer, or activate connected underwear<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>d) Tracking devices and crowdsourced location (key finders, Apple AirTags, \u2026).<br \/>\ne) Apple, Microsoft devices BLE advertisements.<br \/>\nf) COVID-19 contact tracing \/ exposure notification BLE packets.<br \/>\ng) Tracking Tesla cars based on BLE advertisements, decoding VIN number from packets.<br \/>\nh) Other BLE advertisements &#8211; energy meters revealing current indication, sex toys revealing device model, \u2026<br \/>\ni) Bleedingbit &#8211; RCE chain via improper BLE advertisements parsing.<\/p>\n<p><strong>3. BLE connections<\/strong><br \/>\na) Theory introduction: GATT specification, central vs peripheral device, services, characteristics, connections, \u2026<br \/>\nb) Connecting to your dedicated BLE device using various tools<\/p>\n<ul>\n<li>nRF Connect mobile application: read\/write\/notify, automation with macros.<\/li>\n<li>BlueZ command-line<\/li>\n<li>other tools<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>c) Taking control of simple, insecure devices (BLE dildo, key finder, &#8230;)<\/p>\n<p><strong>4. Sniffing BLE<\/strong><br \/>\na) BLE RF layer theory introduction<\/p>\n<ul>\n<li>Radio modulation, channels, hopping, connection initiation<\/li>\n<li>Why so many devices do not encrypt link-layer<\/li>\n<li>Various sniffing hardware and software options<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>b) Sniffing live raw BLE packets from the air using provided hardware and Wireshark<\/p>\n<ul>\n<li>Wireshark tips&amp;tricks<\/li>\n<li>Capture your own connection from mobile app to your BLE device<\/li>\n<li>\u00a0How to combine multiple sniffers for better reliability<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>c) Sniffing demos: smart lock plain text password, banking token OTP<br \/>\nd) Overview of various hardware and open source sniffers: nRF Sniffer, Ubertooth, Btlejack, Sniffle, SDR, \u2026<\/p>\n<p><strong>5. BLE HCI dump \u2013 reliably capture own packets<\/strong><br \/>\na) Difference from RF layer sniffing<br \/>\nb) Investigate BLE packets intercepted on Android phone in Wireshark<br \/>\nc) Linux command-line hcidump<\/p>\n<p><strong>6. BLE \u201cMachine in the Middle\u201d \/ remote relay<\/strong><br \/>\nd) Conditions for MITM, attack scenarios, MAC address cloning<br \/>\ne) BLE MITM \/ remote relay in practice (local, via Internet), various tools (GATTacker, BtleJuice, Mirage).<br \/>\nf) Abusing proximity autounlock feature via remote relay.<br \/>\ng) Tampering BLE packets via MITM &#8211; demo using mobile Point of Sale to alter information displayed on terminal.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Day 2<\/strong><\/h5>\n<hr \/>\n<p><strong>7. BLE insecurity case studies including several smart locks *and Tesla cars*<br \/>\n<\/strong>a) Sample smart lock attack: decompile Android application, reverse-engineer BLE protocol commands, identify weakness in protocol, exploit in practice using mobile application<br \/>\nb) Various attacks on proprietary authentication\/encryption protocols based on real devices (including several smart locks).<br \/>\nc) Abusing excessive BLE services, hard-coded credentials, remote access share functionality, cloud interface, &#8230;<\/p>\n<p><strong>8. BLE link-layer security<\/strong><br \/>\na) BLE link layer security mechanisms &#8211; introduction, levels, pairing, bonding, why most devices do not implement it at all.<br \/>\nb) Pair the provided smartphone with your dedicated BLE device, sniff the pairing process and crack it.<br \/>\nc) Attacks possible on paired\/bonded connections.<br \/>\nd) BLE MAC address randomization, \u201csilent pairing\u201d attacks recovering Identity Resolving Key (for example leveraging contact tracing apps).<br \/>\ne) Abusing trust relationships of bonded devices &#8211; vulnerabilities in HID devices, Google Titan U2F token vulnerability technical analysis, attacks via other applications installed on the same mobile phone, &#8230;<\/p>\n<p><strong>9. Provided BLE development boards<\/strong><br \/>\na) Technical details about provided BLE devboards.<br \/>\nb) How to develop own firmware or adjust included training device source code.<br \/>\nc) Review of provided firmware images \/ source (sniffer, attack tools, dedicated BLE device).<br \/>\nd) Flashing firmware on the devkits.<\/p>\n<p><strong>10. BLE jamming and hijacking<\/strong><br \/>\na) Theory introduction: how to hijack BLE ongoing connections<br \/>\nb) Btlejack, ButteRFly \u2013 possible attacks, tools usage.<\/p>\n<p><strong>11. Web Bluetooth<\/strong><br \/>\na) Introduction, security design consideration, sample implementations, possible attacks<br \/>\nb) Interact with your BLE device via browser &#8211; run sample Web Bluetooth javascript code.<\/p>\n<p><strong>12. BLE device firmware over the air update security<\/strong><br \/>\na) Introduction, how the firmware update works, memory layout of BLE SoC.<br \/>\nb) Abuse insecure Over The Air firmware update on provided Nordic Semiconductor SoC.<br \/>\nc) Insecure OTA firmware upgrade in Texas Instruments SoC (taking control over wireless routers, stealing Tesla keys, \u2026).<\/p>\n<p><strong>13. Bluetooth 5 and beyond<\/strong><br \/>\na) Introduction, new features, why so many devices claim to be Bluetooth 5 but are not really.<br \/>\nb) New physical layers: 2M, long range coded PHY.<br \/>\nc) New channel hopping RNG.<br \/>\nd) Sniffing BLE5 \u2013 current hardware, software support.<\/p>\n<p><strong>14. Bluetooth Mesh<\/strong><br \/>\na) Introduction, network topology, BLE4 advertisements as a transport layer, mandatory encryption.<br \/>\nb) Flashing sample Bluetooth Mesh device firmware on a supplied devkit.<br \/>\nc) Provisioning the devices in practice into your own Mesh network<br \/>\nd) Known vulnerabilities and possible weaknesses of Mesh implementations.<\/p>\n<p><strong>15. Other attacks on BLE devices<\/strong><br \/>\na) Attacking BLE devices via RF side-channel analysis (e.g. leaking AES key).<br \/>\nb) Vulnerabilities in BLE SDK (e.g. RCE in Nordic SoftDevice)<br \/>\nc) SoC vulnerabilities (memory readout protection bypass, fault injection,\u2026). Sample attack to try out in practice on provided nRF51 development board<\/p>\n<p><strong>16. Brief review of the multitude attacks on BLE protocol and its implementations as well as attack tools (Bleedingbit, Sweyntooth, BlueFrag, KNOB, BIAS, BLESA, BLURTooth, Frankenstein, JackBNimBLE, InjectaBLE, \u2026)<\/strong><\/p>\n<p><strong>17. Summary, best practices, references, \u201chackme\u201d challenges\u2026<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<hr \/>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4 style=\"text-align: left\"><span style=\"color: #993300\"><em><strong>This 2-day BLE course is part of a 4-day BLE &amp; NFC\/RFID course.<\/strong><\/em><\/span><\/h4>\n<h5 style=\"text-align: left\"><span style=\"color: #993300\"><em><br \/>\n&#8211; To join the 2-day NFC\/RFID course instead,<strong> <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-nfc-rfid-hitb2023ams\/\">click here.<\/a><\/strong><br \/>\n&#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days,<strong> <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-ble-nfc-rfid-4-day-combo-hitb2023ams\/\">click here.<\/a><\/strong><\/em><\/span><span style=\"color: #993300\"><em><br \/>\n<\/em><\/span><\/h5>\n<div>\n<hr \/>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; This 2-day BLE course is part of a 4-day BLE &amp; NFC\/RFID course. &#8211; To join the 2-day NFC\/RFID course instead, click here. &#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, click here. &#8211; To join only this 2-day BLE class, read further below. REGISTRATION CLOSED DATE: 17-18 [&hellip;]<\/p>\n","protected":false},"featured_media":9582,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[58,55,56],"product_tag":[],"class_list":{"0":"post-9584","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-2-day-training","7":"product_cat-hitb2023ams","8":"product_cat-in-person","10":"first","11":"instock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hands-On Hacking for BLE [2-Day] - HITBSecConf2023 - Amsterdam<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hands-On Hacking for BLE [2-Day] - HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"og:description\" content=\"&nbsp; This 2-day BLE course is part of a 4-day BLE &amp; NFC\/RFID course. &#8211; To join the 2-day NFC\/RFID course instead, click here. &#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, click here. &#8211; To join only this 2-day BLE class, read further below. REGISTRATION CLOSED DATE: 17-18 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-18T06:26:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/\",\"name\":\"Hands-On Hacking for BLE [2-Day] - HITBSecConf2023 - Amsterdam\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\",\"datePublished\":\"2022-11-02T06:35:28+00:00\",\"dateModified\":\"2023-04-18T06:26:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hands-On Hacking for BLE [2-Day]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\",\"name\":\"HITBSecConf2023 - Amsterdam\",\"description\":\"#HITB2021AMS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hands-On Hacking for BLE [2-Day] - HITBSecConf2023 - Amsterdam","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/","og_locale":"en_US","og_type":"article","og_title":"Hands-On Hacking for BLE [2-Day] - HITBSecConf2023 - Amsterdam","og_description":"&nbsp; This 2-day BLE course is part of a 4-day BLE &amp; NFC\/RFID course. &#8211; To join the 2-day NFC\/RFID course instead, click here. &#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, click here. &#8211; To join only this 2-day BLE class, read further below. REGISTRATION CLOSED DATE: 17-18 [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/","og_site_name":"HITBSecConf2023 - Amsterdam","article_modified_time":"2023-04-18T06:26:37+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/","name":"Hands-On Hacking for BLE [2-Day] - HITBSecConf2023 - Amsterdam","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","datePublished":"2022-11-02T06:35:28+00:00","dateModified":"2023-04-18T06:26:37+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-ble-hitb2023ams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/"},{"@type":"ListItem","position":3,"name":"Hands-On Hacking for BLE [2-Day]"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/","name":"HITBSecConf2023 - Amsterdam","description":"#HITB2021AMS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product\/9584"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/comments?post=9584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media\/9582"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media?parent=9584"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_cat?post=9584"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_tag?post=9584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}