Skip to main content

Questions tagged [bluetooth]

Bluetooth is a technology that allows for wireless communication between hosts.

0 votes
0 answers
20 views

Rcvd Error Response - Attribute Not Found for Heart Rate Measurement [closed]

I’ve been using the Fitbit Charge 6 Fitness Tracker with the Obsidian Silicone Strap and encountered a persistent issue related to heartbeat rate data retrieval. I consistently encounter the error ...
abdul's user avatar
  • 23
1 vote
0 answers
16 views

Windows 10 - Block File Transfer [migrated]

I would like to disable file transfer via Bluetooth while allowing other Bluetooth services to function normally such as mouse, keyboard, audio, etc. The devices are not on a domain and are not ...
Andam's user avatar
  • 111
2 votes
1 answer
75 views

Can a bonded BLE connection secure communications between two devices and prevent attackers from replaying/reading messages/cmds sent between the two?

I have Device A (Phone) which will pair with Device B (Light Switch) using "Unauthenticated Pairing with Encryption". My belief was that this level of encryption would be enough to prevent ...
Ampersand's user avatar
2 votes
1 answer
54 views

Why is the "intermediate" challenge needed in Bluetooth ECDH since the "real" verification is performed at the end with code comparison?

Why is step 4 needed? What does it protect in terms of security? Doesn't the protection arrives from the last step so when Va and Vb (so called TK, Temporary Keys) are compared? Other thing: I read ...
allexj's user avatar
  • 129
2 votes
2 answers
130 views

How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

I am attempting to analyze the Bluetooth communication between a fitness tracker (GOJI ACTIVE GFITBK20 Activity Tracker) and its corresponding application (Goji Active) installed on my Android phone. ...
abdul's user avatar
  • 23
0 votes
0 answers
20 views

Is there any software needed to install from Parrot OS for TP-Link UB500 Nano USB bluetooth 5.0? [closed]

I am performing experiment on trying to capture Bluetooth traffic from the fitness device to the Mobile App installed on the Phone. I am using commands like gatttool, hciconfig, hcitool lescan to scan ...
abdul's user avatar
  • 23
5 votes
0 answers
144 views

Android Find My Device Network Privacy

My Android device today popped up a screen indicating that it had joined the new Find My Device Network that allows two-way scanning of device locations over Bluetooth. Despite Google's claims of ...
Robert Chapin's user avatar
2 votes
0 answers
127 views

Why does Bluetooth Low Energy Secure Connections with Passkey Entry check the Passkey bit by bit?

If we want to enable an authenticated connection via BLE the passkey method seems like a good idea. A 6-digit PIN is generated randomly on one device and has to be entered on the other - these 20 Bit ...
jusaca's user avatar
  • 71
8 votes
2 answers
2k views

Doubts about Bluetooth Secure Authentication

I'm reading "Guide to Bluetooth Security" by NIST (available here). At page 22 (page 33 of the PDF), they describe the Secure Authentication scheme. From what I can understand, both the ...
StefanoTrv's user avatar
1 vote
0 answers
115 views

Needing information on cyberattack that occured [closed]

If someone hacks into your WiFi and comes through an unlocked networked and knows your password and IP address and learns the specs on all your devices, the computer and cellphones, the smart TV, are ...
Larry Lesser's user avatar
0 votes
1 answer
187 views

How to get accurate info on a device from solely the bluetooth address? [duplicate]

I am looking to be able to scan bluetooth addresses around me, and then get info on the devices from the address (i.e. if its a phone/speaker, or maybe if there is a public registry of device ...
Kovy Jacob's user avatar
0 votes
1 answer
153 views

Suspected Audio/Wireless/Bluetooth Hijacking - Need Expert Insight [closed]

I have reason to believe that there may be ongoing audio/wireless/Bluetooth hijacking occurring in my network environment. The issue appears to involve unauthorized access to Bluetooth and wireless ...
Jimmy's user avatar
  • 3
1 vote
1 answer
145 views

Are Bluetooth and/or NFC anonymous?

Suppose I have a smartphone and I have disabled all usual de-anonymizing things (e.g., wifi probe requests). My phone sends some data over Bluetooth (or NFC) to device A, and then at a different place ...
Sam Jaques's user avatar
1 vote
0 answers
249 views

Are Android Bluetooth file transfers encrypted?

Suppose I pair two Android phones together using Bluetooth and transfer a file from the first phone to the second by sharing the file using Bluetooth. Does Android encrypt the file transfer so that no ...
Flux's user avatar
  • 923
1 vote
0 answers
209 views

Why was CVE-2022-20411 (Bluetooth Remote Code Execution) not detected by Android's BoundSanitizer?

CVE-2022-20411 enabled remote code execution over Bluetooth on Android. It was fixed in December 2022. But why was it not detected by Android's BoundsSanitizer? Its purpose is to detect and prevent ...
Finni's user avatar
  • 111

15 30 50 per page
1
2 3 4 5
12