Skip to content

Commit 1a934b4

Browse files
authored
Update pentesting-ble-bluetooth-low-energy.md
1 parent af7037f commit 1a934b4

File tree

1 file changed

+1
-14
lines changed

1 file changed

+1
-14
lines changed

src/todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md

Lines changed: 1 addition & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -262,19 +262,6 @@ for off in range(0, len(img_bytes), CHUNK):
262262

263263
</details>
264264

265-
Reversing the app protocol quickly
266-
- Extract the static AES key by decompiling the Android APK (e.g., with JADX). Search for AES, ECB, and the above UUIDs; keys are typically in helper classes.
267-
- Capture Android Bluetooth HCI snoop logs to map commands and UUIDs to user actions. Enable “Bluetooth HCI snoop log” in Developer options, reproduce actions, then pull btsnoop_hci logs and decode with Wireshark to see ATT Write Commands/Notifications.
268-
269-
Hands‑free drive‑by hijacking
270-
- Program a small BLE dev board (e.g., Adafruit Feather nRF52840 running CircuitPython) to:
271-
1) scan for devices exposing the command UUID,
272-
2) connect, send DATS + upload an image to an unused slot,
273-
3) select it with IMAG and set LIGHT/SPEED/PLAY,
274-
4) disconnect and continue scanning.
275-
- The hardware and full CircuitPython reference code are publicly available; see references.
276-
277-
278265
## Operational notes
279266

280267
- Prefer Sonoff+Sniffle on Linux for robust channel hopping and connection following. Keep a spare Nordic sniffer as a backup.
@@ -294,4 +281,4 @@ Hands‑free drive‑by hijacking
294281
- [Android Bluetooth HCI snoop logging](https://source.android.com/docs/core/connect/bluetooth/verifying_debugging)
295282
- [Adafruit Feather nRF52840 Express](https://www.adafruit.com/product/4062)
296283

297-
{{#include ../../banners/hacktricks-training.md}}
284+
{{#include ../../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)