RCayre / injectable-firmware

Custom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks based on InjectaBLE strategy.
MIT License
56 stars 6 forks source link

Flashing pre-compiled hex file #8

Closed GoulongWang closed 2 years ago

GoulongWang commented 2 years ago

Hi RCayre, I flashed the nRF52840 Dongle with pca10059.hex using nRF Programmer app. The dongle was detected by my virtual box as below. image It seemed correct because the dongle changed its name to "Mirage Toolkit [0001]".

But when I used "lsusb" to show info about the dongle, it didn't display "Mirage Toolkit ButteRFly". image

Was there something wrong?

RCayre commented 2 years ago

Hi, I'm sorry, I'm not familiar with this kind of setup, I can't tell you if this behaviour is normal or not in a virtual machine. Did you try to run Mirage ? Is the dongle detected and functional ? Can you provide me the output of sudo mirage ble_info INTERFACE=butterfly0 ?

GoulongWang commented 2 years ago

Hi RCayre, Sorry for the late reply. Here is the screenshot. image

RCayre commented 2 years ago

Hi, everything looks fine on your screenshot, it means that Mirage is able to interact with the dongle. You should be able to run the various supported modules, the missing name is probably a weird bug linked to your VM setup.

I close the issue for now, let me know if you encounter any issues.