• Hack the Airwaves

  • Advanced BLE Exploitation Techniques
  • By: Josh Luberisse
  • Narrated by: Virtual Voice
  • Length: 3 hrs and 2 mins

Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.
Hack the Airwaves  By  cover art

Hack the Airwaves

By: Josh Luberisse
Narrated by: Virtual Voice
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $14.99

Buy for $14.99

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Background images

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks

Publisher's summary

In "Hack the Airwaves," Josh, a seasoned cybersecurity expert, delves deep into the intricate world of Bluetooth Low Energy (BLE) security. As BLE devices become increasingly integrated into our daily lives, the potential for vulnerabilities and threats grows exponentially. This comprehensive guide is designed for hackers, red team operators, pentesters, and other cybersecurity practitioners who seek both a foundational understanding and advanced knowledge of BLE's potential risks and defenses.

Drawing from hands-on experiences, real-world case studies, and practical demonstrations, Josh offers readers a unique blend of theoretical insights and actionable techniques. From understanding the core protocols of BLE to crafting custom payloads and defending against sophisticated attacks, "Hack the Airwaves" covers the full spectrum of BLE security.

Key features include:
- A deep dive into the BLE protocol stack, including GATT, GAP, and other core protocols.
- Techniques for signal interception, manipulation, and exploitation.
- Practical guides on setting up labs, crafting malicious payloads, and executing advanced Man-in-the-Middle attacks.
- Strategies for defending against BLE exploits, ensuring robust security for devices and systems.
- Ethical considerations and best practices for responsible and collaborative BLE hacking.

With a forward-thinking approach, Josh also explores the future landscape of BLE security, offering predictions and strategies for staying ahead of emerging threats. Whether you're a seasoned professional or new to the world of BLE hacking, "Hack the Airwaves" is an essential addition to your cybersecurity library.

What listeners say about Hack the Airwaves

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.