Great description of the process of reverse engeneering BLE device. I would love to see you reverse engeneer a BLE enable scale!
Nice video, thanks! Just wondering how you get that "Value" column in Wireshark?
Just a quick side note: if you're in a pinch, you can just share the bug report as a zipped file like you would any other file and therefore skip installing adb if you need. Also thank you this tutorial is fab. Gonna try my hand at reverse engineering my Anker Prime bluetooth coms
Thanks for this. I was able to reverse engineer a BLE lamp using this tutorial.
So glad this came across my feed, I am new to HA and love being able to "hack" other products to work together. Great step by step and video production, subscribed!
Great video David!
ok that was awesome. Keep the videos coming!
Great video! As I understand this is a BLE device. What about bluetooth classic devices? In my capture file I dont have btatt packets. However I see spme L2CAP packets (with the destination matching my target device) are those the ones I should be looking into?
Thank you so much. This gave me a start to understand how to program for Bluetooth devices.
Excellent Video. Title is totally justified!
Wow that was some amazing work, subscribed!
I'm going to try this... I really want to gain access to a Bluetooth device because the app hasn't been updated to work on newer versions of android and all I really want to do is turn it on and off and hopefully get data from it. Thanks!
Thank you, this has helped me understand a good bit more how these devices work. I've been trying to make an integration for my watch to gadgetbridge. It's not 1:1 to a bluetooth lamp. I don't see a uuid under the handle, and I have to figure out how to listen and understand the response by the watch. If you have any suggestions on how to do that, I would be grateful. Nonetheless the video helped give me a great start.
Great tutorial! Are you planning to cover Bluetooth mesh reverse engineering?
Amazing and helpful, thanks a lot for your tutorial. I have a question regarding the Philips Hue white lamp. The values send by the write command from my phone to the lamp don't show a pattern. They look like encrypted and have a length of 256 byte. How to go on with that? The aim is to program a board like esp32 to be controlled by the hue app.
Great video, looking for a solution to control a Bluetooth device like this for a long time. When do you plan to release part 2?
Can you please do more reverse engineering common hardware please
Thanks for this useful video. I have 2 devices that I am attempting to reverse engineer. The first device showed no ATT data when I looked at it in wireshark, but the second device is very similar to your video, with the commands being plain text readable. The first device looks almost like it might be somehow configured in bluetooth advertising mode in order to communicate. Does that sound at all possible? If I open bluetooth scan on my phone I'm unable to find the device, but if I open the app it just "works" without any pairing, etc. If I disable bluetooth on my phone the device stops working, so I'm pretty sure it is using bluetooth (aside from the box saying it's bluetooth). Do you have any ideas or resources or even names of what I can search for if my device is using advertising mode to communicate between the android phone and the bluetooth device?
Hello! I loved this video. I was wondering, is there a way where you could take control of a device that has bluetooth capabilities, but does not have an app that it uses to control it? My specific case is portable light that sends out a bluetooth singal (it shows as a connectable device) and has features things such as color and blinking, but it does not have an app to control these things.
@namero999