aksarburak / ec521

Project about exploiting vulnerabilities of smart watches

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Hacking Fitness Trackers - EC521 Term Project

Project about exploiting vulnerabilities of smart watches specifically worked on Xiaomi Mi Band 2, Fitbit, Nike FuelBand SE Fitness Tracker.

Planned steps

  • Detailed examination of Bluetooth Low Energy protocol
    • Specifically Just WorksTM pairing method
  • ATT & GATT
    • UUID characteristcs are analyzed to understand communication details
  • BT debugger: Bluetooth service analyzer
  • HCI-tool scanning connections
  • bluepy:Python interface to Bluetooth LE on Linux
  • Examining bluetooth logs via Anroid HCI logs
    • Wireshark
  • After getting the log, we have found gATT communication among miband and android phone.
  • Decompiling the APK
    • Smali code injection to drop connection between user and miband
  • Miband2Manager.py - Authenticate to unpaired band using bluepy
  • Sniff data

Authors

  • Mert Toslali - Researcher - Toslali
  • Burak Aksar - Researcher - Aksar
  • Beliz Kaleli - Researcher - Kaleli

License

This project is licensed under the MIT License - see the LICENSE.md file for details

Acknowledgments

*Update here!

About

Project about exploiting vulnerabilities of smart watches


Languages

Language:Smali 99.7%Language:Python 0.3%