You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I was trying to hack my BLE key card and I came across this great tool, but there're some questions I'd like to ask.
The key card connects to a smart phone with LTK encryption (Which I can crack with Crackle). Because the private key stored in the card regenerates every time the card is connected to a new phone, I will have to hack it without actually pairing with it.
So, the idea I came up is to spoof the real phone connected to the key card and try to get its key.
I think it was possible to achieve the spoofing part of my plan with Gattacker, but the problem is they uses LTK to encrypt their communications.
Is Gattacker available to send LTK encrypted packet if I know the LTK?
The text was updated successfully, but these errors were encountered:
Hi, I was trying to hack my BLE key card and I came across this great tool, but there're some questions I'd like to ask.
The key card connects to a smart phone with LTK encryption (Which I can crack with Crackle). Because the private key stored in the card regenerates every time the card is connected to a new phone, I will have to hack it without actually pairing with it.
So, the idea I came up is to spoof the real phone connected to the key card and try to get its key.
I think it was possible to achieve the spoofing part of my plan with Gattacker, but the problem is they uses LTK to encrypt their communications.
Is Gattacker available to send LTK encrypted packet if I know the LTK?
The text was updated successfully, but these errors were encountered: