In this article, we will try to reverse engineer the application to acquire the required characteristics needed to set up a rogue BLE peripheral. The goal is to find how to simulate the real device without having the device itself, explore the communication protocol and the kind of exchanged data. Then, we will be able…
BLE:Bit for Reverse Development – Case Study: Helium Hotspot
Posted on