diff --git a/pages/common/crackle.md b/pages/common/crackle.md new file mode 100644 index 0000000000..8b0ec0e622 --- /dev/null +++ b/pages/common/crackle.md @@ -0,0 +1,16 @@ +# crackle + +> Crack and decrypt Bluetooth Low Energy (BLE) encryption. +> More information: . + +- Check whether the recorded BLE communications contain the packets necessary for recovering temporary keys (TKs): + +`crackle -i {{path/to/input.pcap}}` + +- Use brute force to recover the TK of the recorded pairing events and use it to decrypt all subsequent communications: + +`crackle -i {{path/to/input.pcap}} -o {{path/to/decrypted.pcap}}` + +- Use the specified long-term key (LTK) to decrypt the recorded communication: + +`crackle -i {{path/to/input.pcap}} -o {{path/to/decrypted.pcap}} -l {{81b06facd90fe7a6e9bbd9cee59736a7}}`