Categories

BLE fun with Ubertooth: sniffing Bluetooth Smart and cracking its crypto

Posted on Wednesday, January 29th, 2014 in code, encryption, hacks, RF, wireless by the machinegeek

ubertooth-one
Mike Ryan writes about his latest efforts in BLE hacking.

Hot on the heels of Omri Iluz’s BLE-sniffer-on-the-cheap, I decided to write up the BLE sniffer I built on Ubertooth. My sniffer highly robust, can capture data from connections, and is 100% open source. I also discovered a vulnerability in BLE’s crypto that allows me to crack its encryption key and decrypt traffic — 100% passively.

Here’s a link to the blog post.

Via the contact form.

This entry was posted on Wednesday, January 29th, 2014 at 12:59 am and is filed under code, encryption, hacks, RF, wireless. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

One Response to “BLE fun with Ubertooth: sniffing Bluetooth Smart and cracking its crypto”

  1. Randell David says:

    Very interesting project.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Sjaak: In theory the buspirate can also do SWD or JTAG as it just wiggling some pins. I dunno if the speed and memory is sufficient...
  • Drone: Aw, how-come Bus-Pirate can't do all this too?
  • Siddharth: Grate
  • jeanmarc78: hello
  • KH: So I guess, don't mind us dinosaurs too much. Someone like me will get triggered by some of the things Arduino folks do. There's just...