Headphone Jacking: A Key to Your Phone

We discovered three vulnerabilities in popular Bluetooth audio devices that allow a complete device compromise. We demonstrate the immediate impact using a pair of current-generation headphones. Finally, we show how a compromised Bluetooth peripheral can be abused to extract data the paired smartphone.

 

About the Speakers