BLE pairing method with Passkey entry – is it possible to sniff passkey value?

I have my custom made Android app which is connecting to my BLE controller. I want to prove that BLE is secured from passive eavesdropping. I have Adafruit Bluefruit BLE Sniffer and Wireshark. I can see packets transfered from Master to Sl… Continue reading BLE pairing method with Passkey entry – is it possible to sniff passkey value?

Unfamiliar user agents ‘CON 1.0 urlexists’ and ‘VANILLA 1.0 vanillastub’ – are they malicious?

I’m analyzing a pcap via Wireshark, and there are multiple get requests to the IP. These requests use different user agents, which I can’t find anything about when I search. The user agents:

CON 1.0 urlexists
VANILLA 1.0 vanillastub

Eac… Continue reading Unfamiliar user agents ‘CON 1.0 urlexists’ and ‘VANILLA 1.0 vanillastub’ – are they malicious?

Reverse Engineering an RGB Keyboard Under Linux

Hardware support under Linux is far better than it ever has been in the past. These days, most things “just work” out of the box, and you probably won’t have to compile any custom kernel modules. Certainly a far cry from where things were a decade ago. But that doesn’t …read more

Continue reading Reverse Engineering an RGB Keyboard Under Linux

Is it possible to extract a certificate that an application uses to connect to an API server?

There’s an API server that only allows connections including specific SSL certificates. Talking about an Android application that has those certificates.

Using Fiddler without SSL decryption as a proxy between the app and the server, I ca… Continue reading Is it possible to extract a certificate that an application uses to connect to an API server?