SlideShare a Scribd company logo
Hacking
BLE SmartWatch
IDSECCONF 2019, Cirebon
SMRX86
#whoami
  Independent security researcher.
  My job is doing trick to impress client.
  Speaker Idsecconf 2013, 2014, 2015, etc.
Relevant Research
  Leo Soares. “Mi Band 2, Part 1: Authentication.”, Internet: https://
leojrfs.github.io/writing/miband2-part1-auth/, Nov. 25, 2017.
  David Lodge, “Reverse Engineering BLE from Android apps with Frida”,
Internet: https://www.pentestpartners.com/security-blog/reverse-engineering-
ble-from-android-apps-with-frida/, Feb 23, 2018.
BASIC BLE
IDSECCONF 2019, Cirebon
SMRX86
BLE Communication Layer
Characteristic & Handle
Characteristic & Handle
Characteristic & Handle
Trial & Error/Success
IDSECCONF 2019, Cirebon
SMRX86
GATTACKER (active sniffing)
(Unseccessfull) GATTACKER
Android_hcidump
(/data/misc/bluetooth/logs/btsnoop_hci.log)
Android_hcidump
(Active Sniffing) FRIDA
(mifit ver 3.3.2)
(Active Sniffing) FRIDA
(mifit ver 3.3.2)
(Active Sniffing) FRIDA
(Active Sniffing) FRIDA
(Active Sniffing) FRIDA
WHERE IS
CHAR UUID
& HANDLE
FRIDA + Android_hcidump
Mapping
Authentification
IDSECCONF 2019, Cirebon
SMRX86
Authentification Procedure
POC
POC script is adjustment of recent
@leojrs (0x08 > 0x00)
POC
Thanks…

More Related Content

PDF
UG Degree Certificate
PDF
hacking_ble_smartwatch @idsecconf2019 cirebon
PPTX
From Reversing to Exploitation
PDF
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
PPTX
From Reversing to Exploitation: Android Application Security in Essence
PDF
Mobile Penetration Testing: Episode III - Attack of the Code
PDF
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
PDF
Smart Attendance System using Raspberry Pi
UG Degree Certificate
hacking_ble_smartwatch @idsecconf2019 cirebon
From Reversing to Exploitation
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
From Reversing to Exploitation: Android Application Security in Essence
Mobile Penetration Testing: Episode III - Attack of the Code
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
Smart Attendance System using Raspberry Pi

Similar to Hacking ble smartwatch (20)

PDF
A Study on Modern Methods for Detecting Mobile Malware
PDF
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
DOCX
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
PDF
ESP32 CAM Face Detection Door Lock
PDF
Keyloggers A Malicious Attack
PDF
Liferay Italy Symposium 2015 Liferay Mobile SDK and Liferay Screens
PDF
draft.ResearchPoster
PDF
Introduction to Android Application Security Testing - 2nd Sep 2017
PPTX
iOS Security: The Never-Ending Story of Malicious Profiles
PPTX
Fabrizio Cornelli - Securing Android Apps by Reversing - Codemotion Milan 2018
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
apidays New York 2023 - Android Applications and APIs Hacking, Gabrielle Botb...
PPTX
Attack Vectors in Biometric Recognition Systems
PDF
MODERN MALWARE THREAT: HANDLING OBFUSCATED CODE -- CONFIDENCE CONFERENCE (2019)
PDF
Android Application for Mobile Attendance using NFC
PDF
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
PDF
WLAN Penetration Examination of The University of Pembangunan Panca Budi
PDF
IRJET- Obfuscation: Maze of Code
PPTX
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
PDF
Color based android shuffling pattern lock
A Study on Modern Methods for Detecting Mobile Malware
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
ESP32 CAM Face Detection Door Lock
Keyloggers A Malicious Attack
Liferay Italy Symposium 2015 Liferay Mobile SDK and Liferay Screens
draft.ResearchPoster
Introduction to Android Application Security Testing - 2nd Sep 2017
iOS Security: The Never-Ending Story of Malicious Profiles
Fabrizio Cornelli - Securing Android Apps by Reversing - Codemotion Milan 2018
Sbvlc secure barcode based visible light communication for smartphones
apidays New York 2023 - Android Applications and APIs Hacking, Gabrielle Botb...
Attack Vectors in Biometric Recognition Systems
MODERN MALWARE THREAT: HANDLING OBFUSCATED CODE -- CONFIDENCE CONFERENCE (2019)
Android Application for Mobile Attendance using NFC
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
WLAN Penetration Examination of The University of Pembangunan Panca Budi
IRJET- Obfuscation: Maze of Code
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Color based android shuffling pattern lock

More from idsecconf (20)

PDF
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
PDF
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
PDF
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
PDF
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
PDF
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
PDF
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
PDF
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
PDF
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
PDF
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
PDF
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
PDF
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
PDF
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
PDF
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
PDF
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
PDF
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
PDF
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
PDF
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
PDF
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
PDF
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
PDF
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...

Recently uploaded (20)

PPTX
innovation process that make everything different.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
DOCX
Unit-3 cyber security network security of internet system
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
Digital Literacy And Online Safety on internet
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introduction to Information and Communication Technology
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
innovation process that make everything different.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
presentation_pfe-universite-molay-seltan.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Power Point - Lesson 3_2.pptx grad school presentation
Module 1 - Cyber Law and Ethics 101.pptx
newyork.pptxirantrafgshenepalchinachinane
Unit-3 cyber security network security of internet system
Sims 4 Historia para lo sims 4 para jugar
Mathew Digital SEO Checklist Guidlines 2025
Digital Literacy And Online Safety on internet
Paper PDF World Game (s) Great Redesign.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Introduction to Information and Communication Technology
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
artificialintelligenceai1-copy-210604123353.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt

Hacking ble smartwatch