0

Nike+ FuelBand SE BLE Protocol Reversed

Nikeband

Nike+ FuelBand SE BLE Protocol Reversed. Neato – Simone writes-

I’ve completely reversed its protocol and found out the following key points:
• The authentication system is vulnerable, anyone could connect to your device.
• The protocol supports direct reading and writing of the device memory, up to 65K of contents.
• The protocol supports commands that are not supposed to be implemented in a production release (bootloader mode, device self test, etc ).


Join 5,000+ makers on Adafruit’s Discord channels and be part of the community! http://adafru.it/discord

CircuitPython in 2018 – Python on Microcontrollers is here!

Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.

Join us every Wednesday night at 8pm ET for Ask an Engineer!

Follow Adafruit on Instagram for top secret new products, behinds the scenes and more https://www.instagram.com/adafruit/


Maker Business — A journey through Shenzhen, the electronics manufacturing hub of the world

Wearables — Ice, ice baby

Electronics — Current limiting!

Biohacking — Grindfest 2018

Python for Microcontrollers — CRICKITs are coming!

Get the only spam-free daily newsletter about wearables, running a "maker business", electronic tips and more! Subscribe at AdafruitDaily.com !



No Comments

No comments yet.

Sorry, the comment form is closed at this time.