0

January 30, 2015 AT 5:11 am

Nike+ FuelBand SE BLE Protocol Reversed

Nikeband

Nike+ FuelBand SE BLE Protocol Reversed. Neato – Simone writes-

I’ve completely reversed its protocol and found out the following key points:
• The authentication system is vulnerable, anyone could connect to your device.
• The protocol supports direct reading and writing of the device memory, up to 65K of contents.
• The protocol supports commands that are not supposed to be implemented in a production release (bootloader mode, device self test, etc ).


Check out all the Circuit Playground Episodes! Our new kid’s show and subscribe!

Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.

Join us every Wednesday night at 8pm ET for Ask an Engineer!

Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground”Adafruit’s Apps!


Maker Business — “ORANGE PI: MEETING WITH STEVEN ZHAO IN SHENZHEN”

Wearables — Design with IFTTT

Electronics — Keep track of those rails!

Biohacking — Why Our Eyes Cannot Look at a Solar Eclipse

Get the only spam-free daily newsletter about wearables, running a "maker business", electronic tips and more! Subscribe at AdafruitDaily.com !



No Comments

No comments yet.

Sorry, the comment form is closed at this time.