--- Log opened Sun Dec 30 00:00:12 2018 00:31 -!- crashcartpro [uid29931@gateway/web/irccloud.com/x-gownavsyyzgkijfn] has quit [Quit: Connection closed for inactivity] 10:21 <@brimstone> xray: what are you hacking on with the sgs3? 17:02 -!- dfused [~flajackun@c-71-197-193-151.hsd1.wa.comcast.net] has joined #se2600 21:11 < xray> Linux on phones and Bluetooth hacking. 21:12 < xray> I have a few older phones but none with the features of the more modern phones like the S3 21:17 < xray> One of the things I'm working on with Bluetooth is full pcap (well the Bluetooth equivalent). I've got a RPi 3B+ and an Ubertooth One. I've had some limited success. I also want to do device detection even if the device is not advertising and do a feature dump and Bluetooth push. I can already do it if it is not advertising and I know its MAC (actu 21:17 < xray> ally the Bluetooth equivalent of a MAC). If I can sniff then I can get the MAC from the traffic headers even if they are not advertising (or what ever the term is for it). 21:18 < xray> If I'm successful getting on the SG3 then I may be able to get it to do passive intercept as well. 21:19 < xray> I also want to see if there is a way to defend against the attack without just turning off Bluetooth. 21:20 < xray> A bonus would be finding a way to MITM of Bluetooth live in the field. 23:38 < K`Tetch> like ... 'airsheep'? --- Log closed Mon Dec 31 00:00:14 2018