Project about exploiting vulnerabilities of smart watches specifically worked on Xiaomi Mi Band 2, Fitbit, Nike FuelBand SE Fitness Tracker.
- Detailed examination of Bluetooth Low Energy protocol
- Specifically Just WorksTM pairing method
- ATT & GATT
- UUID characteristcs are analyzed to understand communication details
- BT debugger: Bluetooth service analyzer
- HCI-tool scanning connections
- bluepy:Python interface to Bluetooth LE on Linux
- Examining bluetooth logs via Anroid HCI logs
- Wireshark
- After getting the log, we have found gATT communication among miband and android phone.
- Decompiling the APK
- Smali code injection to drop connection between user and miband
- Miband2Manager.py - Authenticate to unpaired band using bluepy
- Sniff data
- Mert Toslali - Researcher - Toslali
- Burak Aksar - Researcher - Aksar
- Beliz Kaleli - Researcher - Kaleli
This project is licensed under the MIT License - see the LICENSE.md file for details
*Update here!