嗅探/记录自己的Andr​​oid的蓝牙通信 [英] Sniffing/logging your own Android Bluetooth traffic

查看:1104
本文介绍了嗅探/记录自己的Andr​​oid的蓝牙通信的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我最近买了通过蓝牙与Android手机/平板电脑连接chinesse设备。由于没有申请菱的Windows / Linux的我想创建一个用于个人使用。

通常的电话连接到设备和交换一些数据。我连电脑设备,并看着串口调试程序和menaged发现协议(仅限单程)。电话仅发送一个命令到设备。但是这一次,我没能找出它containts。

是否有任何软件,让我寻找到通过蓝牙连接发送的数据?我试图反编译的应用程序,但它看起来非常不友好的。

感谢。

解决方案

Android 4.4系统(奇巧)确实有蓝牙一个新的嗅探能力。你应该给它一个尝试。

  

如果你没有自己的嗅探器可是,你不一定了   运气。在许多情况下,我们可以得到一个新的积极成果   在Android 4.4系统的推出功能:能够捕获所有   蓝牙HCI数据包,并将它们保存到一个文件中。

     

在分析完毕后,通过运行填充捕获文件   应用程序被测试时,他可以拉所产生的文件   的Andr​​oid到设备的外部存储并分析它(与    Wireshark的,例如)。

     

在此设置被激活,Android将保存抓包   到/sdcard/btsnoop_hci.log由分析师拉和检查。

在情况下,下面 / SD卡/ 是不能在你的设备上正确的道路:

 亚行外壳回声$ EXTERNAL_STORAG​​E
 

  

我们可以再开一个shell拉文件:$亚行拉   /sdcard/btsnoop_hci.log和Wireshark的检查它,如PCAP   通过监听无线通信,例如收集,所以它是非常简单的   并得到广泛支持:

     

     

<一个href="https://viaforensics.com/articles-$p$psentations/bluetooth-packet-capture-android.html">[source]

您可以通过将设置 - >开发人员选项,然后选中该框旁边的启用该蓝牙HCI探听登录。

I recently bought chinesse device that connects via bluetooth with android phone / tablet. Since there is no application availible for windows / linux I want to create one for personal usage.

Usually phone connects to the device and exchanges some data. I connected PC to the device and looked into serial debugger and menaged to discover the protocol (one way only). Phone sends only one command to the device. But this time I'm not able to find out what it containts.

Is there any software that will allow me to look into data sent via bluetooth? I tried decompiling the app, but it looks really unfriendly.

Thanks.

解决方案

Android 4.4 (Kit Kat) does have a new sniffing capability for Bluetooth. You should give it a try.

If you don’t own a sniffing device however, you aren’t necessarily out of luck. In many cases we can obtain positive results with a new feature introduced in Android 4.4: the ability to capture all Bluetooth HCI packets and save them to a file.

When the Analyst has finished populating the capture file by running the application being tested, he can pull the file generated by Android into the external storage of the device and analyze it (with Wireshark, for example).

Once this setting is activated, Android will save the packet capture to /sdcard/btsnoop_hci.log to be pulled by the analyst and inspected.

Type the following in case /sdcard/ is not the right path on your particular device:

adb shell echo $EXTERNAL_STORAGE

We can then open a shell and pull the file: $adb pull /sdcard/btsnoop_hci.log and inspect it with Wireshark, such as a PCAP collected by sniffing WiFi traffic for example, so it is very simple and well supported:

[source]

You can enable this by going to Settings->Developer Options, then checking the box next to "Bluetooth HCI Snoop Log."

这篇关于嗅探/记录自己的Andr​​oid的蓝牙通信的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆