Matheus-Garbelini / sweyntooth_bluetooth_low_energy_attacks

Proof of Concept of Sweyntooth Bluetooth Low Energy (BLE) vulnerabilities.
267 stars 69 forks source link

Routine code about the device under test #33

Open rockmii opened 12 months ago

rockmii commented 12 months ago

I don’t know what kind of routine you used to test the device. I tested the esp32 myself, using the official gatt_server code. Most of the data packets captured by esp32_hci_desync.py are empty packets. Is it me? Is the reason for the wrong routine used? Here I would like to ask what routine you use, thank you!