{"id":125,"date":"2022-01-06T23:34:15","date_gmt":"2022-01-06T23:34:15","guid":{"rendered":"https:\/\/blogs.oregonstate.edu\/davidkaff\/?p=125"},"modified":"2022-01-06T23:34:16","modified_gmt":"2022-01-06T23:34:16","slug":"lessons-from-mmbn","status":"publish","type":"post","link":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/","title":{"rendered":"Lessons from Megaman: Battle Network"},"content":{"rendered":"\n<p>Last term I had the opportunity to create a presentation on any cybersecurity issue of my choosing. I chose &#8220;<a href=\"https:\/\/asset-group.github.io\/disclosures\/braktooth\/\" target=\"_blank\" rel=\"noreferrer noopener\">BrakTooth<\/a>&#8220;, a recent BlueTooth vulnerability discovered by security researchers in Singapore.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This vulnerability allows an attack to levy Denial of Service against nearly any bluetooth enabled device using packets which cannot be ignored without a patch which would have been created subsequent to the announcement of the vulnerability. While most mobile phones have likely been patched, many other devices will likely never be patched. These include speakers, headphones, computer mice and keyboards, and IoT devices such as <a href=\"https:\/\/www.bestbuy.com\/site\/level-touch-edition-bluetooth-smart-lock-satin-nickel\/6464682.p?skuId=6464682\" target=\"_blank\" rel=\"noreferrer noopener\">this bluetooth enabled door lock<\/a>.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In my presentation, I likened the BrakTooth vulnerability to those found in the fictional world presented in the GameBoy Advance title, &#8220;MegaMan: Battle Network.&#8221; In this game (and its sequels), many devices are connected to &#8220;the Net&#8221;, and mal-actors use viruses to attack society at large by exploiting such devices. Plot-lines include fires started by ovens, house floods started by dishwashers, and every door in a hospital being locked.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>As a child, I played these games believing that these dangers of technology were well understood, and that adults would not connect devices to the internet which could be hacked to cause harm to people. I was incredibly incorrect.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>If you&#8217;ve read this far, I would urge you to thoroughly consider any purchase of a &#8220;smart device&#8221;. Specifically, I urge you to think through the implications of the network connectivity of devices being hijacked by someone who wishes you harm, and whether the convenience of such a device warrants the vulnerability inherent in any network connection.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator is-style-dots\" \/>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Last term I had the opportunity to create a presentation on any cybersecurity issue of my choosing. I chose &#8220;BrakTooth&#8220;, a recent BlueTooth vulnerability discovered by security researchers in Singapore. This vulnerability allows an attack to levy Denial of Service against nearly any bluetooth enabled device using packets which cannot be ignored without a patch&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\">Continue reading <span class=\"screen-reader-text\">Lessons from Megaman: Battle Network<\/span><\/a><\/p>\n","protected":false},"author":11555,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-125","post","type-post","status-publish","format-standard","hentry","category-oregon-state-capstone-blog","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lessons from Megaman: Battle Network - David Kaff<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lessons from Megaman: Battle Network - David Kaff\" \/>\n<meta property=\"og:description\" content=\"Last term I had the opportunity to create a presentation on any cybersecurity issue of my choosing. I chose &#8220;BrakTooth&#8220;, a recent BlueTooth vulnerability discovered by security researchers in Singapore. This vulnerability allows an attack to levy Denial of Service against nearly any bluetooth enabled device using packets which cannot be ignored without a patch&hellip; Continue reading Lessons from Megaman: Battle Network\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\" \/>\n<meta property=\"og:site_name\" content=\"David Kaff\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-06T23:34:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-06T23:34:16+00:00\" \/>\n<meta name=\"author\" content=\"David Kaff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Kaff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\"},\"author\":{\"name\":\"David Kaff\",\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/#\/schema\/person\/0d93f65fc3b5939cc721d30965e4f353\"},\"headline\":\"Lessons from Megaman: Battle Network\",\"datePublished\":\"2022-01-06T23:34:15+00:00\",\"dateModified\":\"2022-01-06T23:34:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\"},\"wordCount\":272,\"commentCount\":0,\"articleSection\":[\"Oregon State Capstone Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\",\"url\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\",\"name\":\"Lessons from Megaman: Battle Network - David Kaff\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/#website\"},\"datePublished\":\"2022-01-06T23:34:15+00:00\",\"dateModified\":\"2022-01-06T23:34:16+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/#\/schema\/person\/0d93f65fc3b5939cc721d30965e4f353\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lessons from Megaman: Battle Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/#website\",\"url\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/\",\"name\":\"David Kaff\",\"description\":\"fledgling software engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/#\/schema\/person\/0d93f65fc3b5939cc721d30965e4f353\",\"name\":\"David Kaff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/feece6673b6f1dbb8044d124b27ad93d9c837024b690380c1f3a9cb710d0a470?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/feece6673b6f1dbb8044d124b27ad93d9c837024b690380c1f3a9cb710d0a470?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/feece6673b6f1dbb8044d124b27ad93d9c837024b690380c1f3a9cb710d0a470?s=96&d=mm&r=g\",\"caption\":\"David Kaff\"},\"url\":\"https:\/\/blogs.oregonstate.edu\/davidkaff\/author\/kaffs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lessons from Megaman: Battle Network - David Kaff","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/","og_locale":"en_US","og_type":"article","og_title":"Lessons from Megaman: Battle Network - David Kaff","og_description":"Last term I had the opportunity to create a presentation on any cybersecurity issue of my choosing. I chose &#8220;BrakTooth&#8220;, a recent BlueTooth vulnerability discovered by security researchers in Singapore. This vulnerability allows an attack to levy Denial of Service against nearly any bluetooth enabled device using packets which cannot be ignored without a patch&hellip; Continue reading Lessons from Megaman: Battle Network","og_url":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/","og_site_name":"David Kaff","article_published_time":"2022-01-06T23:34:15+00:00","article_modified_time":"2022-01-06T23:34:16+00:00","author":"David Kaff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Kaff","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#article","isPartOf":{"@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/"},"author":{"name":"David Kaff","@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/#\/schema\/person\/0d93f65fc3b5939cc721d30965e4f353"},"headline":"Lessons from Megaman: Battle Network","datePublished":"2022-01-06T23:34:15+00:00","dateModified":"2022-01-06T23:34:16+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/"},"wordCount":272,"commentCount":0,"articleSection":["Oregon State Capstone Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/","url":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/","name":"Lessons from Megaman: Battle Network - David Kaff","isPartOf":{"@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/#website"},"datePublished":"2022-01-06T23:34:15+00:00","dateModified":"2022-01-06T23:34:16+00:00","author":{"@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/#\/schema\/person\/0d93f65fc3b5939cc721d30965e4f353"},"breadcrumb":{"@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/2022\/01\/06\/lessons-from-mmbn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.oregonstate.edu\/davidkaff\/"},{"@type":"ListItem","position":2,"name":"Lessons from Megaman: Battle Network"}]},{"@type":"WebSite","@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/#website","url":"https:\/\/blogs.oregonstate.edu\/davidkaff\/","name":"David Kaff","description":"fledgling software engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.oregonstate.edu\/davidkaff\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.oregonstate.edu\/davidkaff\/#\/schema\/person\/0d93f65fc3b5939cc721d30965e4f353","name":"David Kaff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/feece6673b6f1dbb8044d124b27ad93d9c837024b690380c1f3a9cb710d0a470?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/feece6673b6f1dbb8044d124b27ad93d9c837024b690380c1f3a9cb710d0a470?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/feece6673b6f1dbb8044d124b27ad93d9c837024b690380c1f3a9cb710d0a470?s=96&d=mm&r=g","caption":"David Kaff"},"url":"https:\/\/blogs.oregonstate.edu\/davidkaff\/author\/kaffs\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/posts\/125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/users\/11555"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":1,"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/posts\/125\/revisions"}],"predecessor-version":[{"id":126,"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/posts\/125\/revisions\/126"}],"wp:attachment":[{"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/media?parent=125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/categories?post=125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/davidkaff\/wp-json\/wp\/v2\/tags?post=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}