FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

Sniffing established BLE connections with HackRF One

By: ๏ผu๏ผuBaze โ€” November 3rd 2025 at 17:14
Bluetooth Low Energy (BLE) powers hundreds of millions of IoT devices โ€” trackers, medical sensors, smart home systems, and more. Understanding these communications is essential for security research and reverse engineering. In our latest article, we explore the specific challenges of sniffing a frequency-hopping BLE connection with a Software Defined Radio (SDR), the new possibilities this approach unlocks, and its practical limitations. ๐Ÿ› ๏ธ What youโ€™ll learn: Why SDRs (like the HackRF One) are valuable for BLE analysis The main hurdles of frequency hopping โ€” and how to approach them What this means for security audits and proprietary protocol discovery โžก๏ธ Read the full post on the blog 
submitted by /u/uBaze
[link] [comments]
โŒ