Categories

BLE fun with Ubertooth: sniffing Bluetooth Smart and cracking its crypto

Posted on Wednesday, January 29th, 2014 in code, encryption, hacks, RF, wireless by the machinegeek

ubertooth-one
Mike Ryan writes about his latest efforts in BLE hacking.

Hot on the heels of Omri Iluz’s BLE-sniffer-on-the-cheap, I decided to write up the BLE sniffer I built on Ubertooth. My sniffer highly robust, can capture data from connections, and is 100% open source. I also discovered a vulnerability in BLE’s crypto that allows me to crack its encryption key and decrypt traffic — 100% passively.

Here’s a link to the blog post.

Via the contact form.

This entry was posted on Wednesday, January 29th, 2014 at 12:59 am and is filed under code, encryption, hacks, RF, wireless. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

One Response to “BLE fun with Ubertooth: sniffing Bluetooth Smart and cracking its crypto”

  1. Randell David says:

    Very interesting project.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • KH: TPS62200 will get him to under 15uA, a bit better than the 20-30uA he mentioned. I would try the same thing. Switch some resistors in...
  • KH: Yeah, it's an end-user thing. Very few people would spend hundreds of hours on this kind of project and sustain it. It's more or less...
  • Max: Not quite a dinosaur if you've seen Big Hero 6 though... wait. You've watched it with your kids, didn't you? That's cheating...! ;) One of...
  • Edward Mallon: A visiting researcher dropped by our humble basement workshop with questions about the physical skill level students would need if they added one of our...
  • KH: And that looks really expensive... Only browsed the vid though, I'm an dinosaur so I had the sound off too. Nice of him to open-source...