added raw advertisment payload output to terminal

This commit is contained in:
freqy 2021-05-07 20:57:56 -07:00
parent 9cca9814ae
commit dd3ec5683e
2 changed files with 4 additions and 3 deletions

@ -3,7 +3,6 @@
Cross platform BLE scanner and logger with teeth \n
***add a better description***
# TODO
@ -19,6 +18,7 @@ Cross platform BLE scanner and logger with teeth \n
- ### Output to simple menu for device target / attack selection (Bubbletea? Pterm?)
- ### Implement bitcask DB to hold device info (will likely need a struct) ** eros **
- MAC (Key)
- Device Local Name (data)
- Device Manufacturer Data (data)
@ -46,7 +46,7 @@ Cross platform BLE scanner and logger with teeth \n
- If nordic chip, use DFU attack
- ### Nordic Softdevice compile with tiny go
- ### Nordic Softdevice compile with tiny go (phoebe)
- What to do?

@ -30,8 +30,9 @@ func Scanners() {
if device.LocalName() != projVars.ScanList[device.Address.String()] {
color.Cyan("found device:")
println(device.Address.String(), device.RSSI, device.LocalName())
println(device.AdvertisementPayload)
//TODO: create localname fort devices that dont broadcast one
//TODO: create localname fort devices that dont broadcast one * dust.OhNameMeZaddy() *
projVars.ScanList[device.Address.String()] = device.LocalName()
//fucking sanity check