Categories

BLE fun with Ubertooth: sniffing Bluetooth Smart and cracking its crypto

Posted on Wednesday, January 29th, 2014 in code, encryption, hacks, RF, wireless by the machinegeek

ubertooth-one
Mike Ryan writes about his latest efforts in BLE hacking.

Hot on the heels of Omri Iluz’s BLE-sniffer-on-the-cheap, I decided to write up the BLE sniffer I built on Ubertooth. My sniffer highly robust, can capture data from connections, and is 100% open source. I also discovered a vulnerability in BLE’s crypto that allows me to crack its encryption key and decrypt traffic — 100% passively.

Here’s a link to the blog post.

Via the contact form.

This entry was posted on Wednesday, January 29th, 2014 at 12:59 am and is filed under code, encryption, hacks, RF, wireless. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

One Response to “BLE fun with Ubertooth: sniffing Bluetooth Smart and cracking its crypto”

  1. Randell David says:

    Very interesting project.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Geert Jordaens: I'm not sure what kind of licensing I have to add since it is a fairly straight forward implementation of the adaptive Huffman Decoding. For...
  • erich: For anyone interested, I've added some c++ code for adaptive huffman decoding in the git repository.
  • Sjaak: I would add some more protection in the used trigger file (on the serverpilot site) then not using a standard name :) hopefully they use...
  • Pete Castagna: My friend Charlie who worked in synthesizers at a DOD type of place made a modification to this avalanche pulse generator that allowed him to...
  • Sam Catchpole: Yes please :D