Mipow Playbulb: Bluetooth Connection Sniffing

From Embedded Lab Vienna for IoT & Security
Revision as of 17:49, 16 February 2020 by Cskallak (talk | contribs) (Created page with "== Summary == This documentation explains the basics of Bluetooth hacking perfomed on the MiPow Playbulb Candle with the GATT Tool == Requirements == * Bluetooth adapter w...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Summary

This documentation explains the basics of Bluetooth hacking perfomed on the MiPow Playbulb Candle with the GATT Tool

Requirements

  • Bluetooth adapter which can use BLUETOOTH Low Energy (BTLE)
  • A computer running a Linux distribution e.g. raspberry pi 3

Description

Fundamentals steps

Ensure that the Bluetooth sender is running.

sudo service bluetooth status

If the output shows (dead) use the following command.

sudo service bluetooth restart

Check if the hcitool finds your Bluetooth sender

hcitool dev
hciconfig -a


Retrieve the Bluetooth Address of the victim device

Depending on the Bluetooth Technology (BR/EDR or LE) the device use there are two commands to scan the Bluetooth addresses.

hcitool scan
hcitool lescan

The BLE Scan outputs the Address of the The MiPow Playbulb Candle as follows:

hcitool lescan

DC:48:4B:0F:AC:E6 (unknown)
DC:48:4B:0F:AC:E6 PLAYBULB

Used Hardware

raspberry pi 3 b+

References