The authenticator requires the connecting device to know both a pin code and a nonce, but in reality the authentication algorithm just checks for a hard-coded token of 0xff 0xff 0xff 0xff 0xff 0xff rendering the whole authentication process ineffective.Īfter he authenticated with the Fuelband, started trying various commands to see what he could control over the Bluetooth interface. After reading through the source, he discovered that the authentication method was completely ineffective. He converted the APK to a JAR and then used JD-Gui to read the Java source code of the app. started with the official Nike app for the Fuelband. found that the authentication system of the Fuelband can be easily bypassed and discovered that some low-level functions (such as arbitrarily reading and writing to memory) are completely exposed to the end user or anyone else who hacks past the authentication process. Was trying to reverse-engineer the Bluetooth protocol of his Nike+ Fuelband and made some surprising discoveries.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |