Bypassing Passkey Authentication in Bluetooth Low Energy
暂无分享,去创建一个
Since the attack runs on the Security Manager layer [1], it can reuse a lot of the existing network stack that is already in place for this approach. This namely concerns everything bellow Host Controller Interface (HCI) [1]. Actually, the whole procedure starting with the authentication bypass and continuing to data injection (which would be a regular communication anyway) can be done using a general Bluetooth 4.0 Smart Ready USB dongle via HCI commands.