You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md
+1-14Lines changed: 1 addition & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -262,19 +262,6 @@ for off in range(0, len(img_bytes), CHUNK):
262
262
263
263
</details>
264
264
265
-
Reversing the app protocol quickly
266
-
- Extract the static AES key by decompiling the Android APK (e.g., with JADX). Search for AES, ECB, and the above UUIDs; keys are typically in helper classes.
267
-
- Capture Android Bluetooth HCI snoop logs to map commands and UUIDs to user actions. Enable “Bluetooth HCI snoop log” in Developer options, reproduce actions, then pull btsnoop_hci logs and decode with Wireshark to see ATT Write Commands/Notifications.
268
-
269
-
Hands‑free drive‑by hijacking
270
-
- Program a small BLE dev board (e.g., Adafruit Feather nRF52840 running CircuitPython) to:
271
-
1) scan for devices exposing the command UUID,
272
-
2) connect, send DATS + upload an image to an unused slot,
273
-
3) select it with IMAG and set LIGHT/SPEED/PLAY,
274
-
4) disconnect and continue scanning.
275
-
- The hardware and full CircuitPython reference code are publicly available; see references.
276
-
277
-
278
265
## Operational notes
279
266
280
267
- Prefer Sonoff+Sniffle on Linux for robust channel hopping and connection following. Keep a spare Nordic sniffer as a backup.
@@ -294,4 +281,4 @@ Hands‑free drive‑by hijacking
294
281
-[Android Bluetooth HCI snoop logging](https://source.android.com/docs/core/connect/bluetooth/verifying_debugging)
0 commit comments