Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Computing Hop Increment - TIME SENSITIVE #77

Open
oncegrey opened this issue Oct 5, 2022 · 3 comments
Open

Computing Hop Increment - TIME SENSITIVE #77

oncegrey opened this issue Oct 5, 2022 · 3 comments

Comments

@oncegrey
Copy link

oncegrey commented Oct 5, 2022

Hi all! I am a cybersecurity student using btlejack for some investigations

I am trying to perform all attacks but am having issues with computing hop increment, I read through some questions that were similar and have followed advice. I am using 3 v1.5 microbits to try process this but it still seems to be taking a long time.

Any advice?

btlejack -f 0x50657d59 -j 
BtleJack version 2.0

[i] Using cached parameters (created on 2022-10-05 15:23:22)
[i] Detected sniffers:
 > Sniffer #0: fw version 2.0
 > Sniffer #1: fw version 2.0
 > Sniffer #2: fw version 2.0
@oncegrey
Copy link
Author

oncegrey commented Oct 6, 2022

@virtualabs Sorry to bother you, but I'd love a hand on this. I'm actually writing a paper on your software for my university and would really love some help on this if you can.

@virtualabs
Copy link
Owner

Hop increment recovery can be impacted by regular channel map updates, and this is more and more common on recent BLE chips. Your device may also use BLE version 5 with its new channel selection algorithm (CSA #2) which does not use the legacy hopping mechanism and thereforce btlejack cannot guess the key parameters to synchronize with the existing connection.

@oncegrey
Copy link
Author

oncegrey commented Oct 7, 2022

Hop increment recovery can be impacted by regular channel map updates, and this is more and more common on recent BLE chips. Your device may also use BLE version 5 with its new channel selection algorithm (CSA #2) which does not use the legacy hopping mechanism and thereforce btlejack cannot guess the key parameters to synchronize with the existing connection.

Hi! So the device is BLE 4.0 and I managed to get it to work using -m 0x1fffffff which seemed to fix the issue and jam the connection and then it died due to jamming which is what I expected to see. I'm hoping if it computes here then hijacking will also work. I am wondering though the best way to record this evidence. I tried using the built-in packet capture but the output pcap seems to be blank.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants