Hi, I was trying to hack my BLE key card and I came across this great tool, but there're some questions I'd like to ask.
The key card connects to a smart phone with LTK encryption (Which I can crack with Crackle). Because the private key stored in the card regenerates every time the card is connected to a new phone, I will have to hack it without actually pairing with it.
So, the idea I came up is to spoof the real phone connected to the key card and try to get its key.
I think it was possible to achieve the spoofing part of my plan with Gattacker, but the problem is they uses LTK to encrypt their communications.
Is Gattacker available to send LTK encrypted packet if I know the LTK?
Hi, I was trying to hack my BLE key card and I came across this great tool, but there're some questions I'd like to ask.
The key card connects to a smart phone with LTK encryption (Which I can crack with Crackle). Because the private key stored in the card regenerates every time the card is connected to a new phone, I will have to hack it without actually pairing with it.
So, the idea I came up is to spoof the real phone connected to the key card and try to get its key. I think it was possible to achieve the spoofing part of my plan with Gattacker, but the problem is they uses LTK to encrypt their communications. Is Gattacker available to send LTK encrypted packet if I know the LTK?