protomolecule/README.md

62 lines
1.1 KiB
Markdown
Raw Normal View History

2021-04-02 21:02:44 +00:00
# protomolecule
2021-05-08 02:23:12 +00:00
Cross platform BLE scanner and logger with teeth \n
***add a better description***
2021-05-08 00:37:23 +00:00
2021-05-08 22:01:32 +00:00
# Dev notes
- **dust** util functions
- **eros** found devices DB
- **phoebe** tiny go stuff
- **scanStuff** well i mean...
- **blueStuff** connect to devices / retreive service characteristics
2021-05-08 00:23:37 +00:00
# TODO
2021-05-07 23:52:08 +00:00
2021-05-08 00:37:23 +00:00
## Short Term Needs
2021-05-07 23:52:08 +00:00
2021-05-08 00:23:37 +00:00
- ### Scan for
- Device Manufacturer Data
- Services UUIDs
2021-05-07 23:52:08 +00:00
2021-05-08 00:23:37 +00:00
- ### Go channels to handle scanning (Keep continous background scanning as an option)
2021-05-07 23:52:08 +00:00
2021-05-08 00:23:37 +00:00
- ### Output to simple menu for device target / attack selection (Bubbletea? Pterm?)
2021-05-07 23:52:08 +00:00
2021-05-08 02:23:12 +00:00
- ### Implement bitcask DB to hold device info (will likely need a struct) ** eros **
2021-05-08 00:23:37 +00:00
- MAC (Key)
- Device Local Name (data)
- Device Manufacturer Data (data)
- Services UUIDs (data)
2021-05-07 23:52:08 +00:00
2021-05-08 00:23:37 +00:00
- ### Implement- Exploit DB
2021-05-07 23:52:08 +00:00
2021-05-08 00:23:37 +00:00
- If GATT exploits are known, present user with options
2021-05-07 23:52:08 +00:00
2021-05-08 22:01:32 +00:00
- ### Logging vs 6.5 grendel drop
2021-05-08 00:37:23 +00:00
- ### Connect to device
- ### Read / Write GATT
2021-05-08 02:23:12 +00:00
- ### Device selection
2021-05-08 00:37:23 +00:00
2021-05-08 00:23:37 +00:00
## Distant Wants
- ### GATT fuzzing
- ### Sweyntooth
- ### Search for DFU
- If nordic chip, use DFU attack
- ### Nordic Softdevice compile with tiny go (phoebe)
2021-05-08 00:23:37 +00:00
- What to do?
- ### C2?