Hacking Exposed Wireless, Third Edition by Wright Joshua
Author:Wright, Joshua
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2015-05-09T04:00:00+00:00
* * *
A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on the book’s companion website at http://www.hackingexposedwireless.com.
The SmartRF Packet Sniffer software includes some functionality for changing the contents of displayed packets (hiding or displaying selected fields) and a basic display filter function to focus the packet display on specific packet types. However, the SmartRF Packet Sniffer utility does not have the same capabilities and convenience as Wireshark. Fortunately, you can convert SmartRF Bluetooth Low Energy Packet Sniffer capture files to the libpcap file format.
The utility tibtle2pcap is a small Python script that reads the SmartRF Packet Sniffer.psd savefile, converting the packet capture to a libpcap format that is compatible with Wireshark and the btle plug-in discussed earlier in this chapter. Download tibtle2pcap at http://www.willhackforsushi.com/code/tibtle2pcap.zip. You can use the tibtle2pcap.py script on Windows or Linux systems (provided you have a Python interpreter installed on Windows), as shown here:
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6211)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5912)
Machine Learning Security Principles by John Paul Mueller(5890)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5548)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5532)
Solidity Programming Essentials by Ritesh Modi(3844)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3489)
Mastering Python for Networking and Security by José Manuel Ortega(3323)
Future Crimes by Marc Goodman(3316)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3313)
Blockchain Basics by Daniel Drescher(3276)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3201)
Learn Computer Forensics - Second Edition by William Oettinger(2997)
Mobile App Reverse Engineering by Abhinav Mishra(2867)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2842)
The Code Book by Simon Singh(2777)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2764)
Incident Response with Threat Intelligence by Roberto Martínez(2689)
The Art Of Deception by Kevin Mitnick(2587)
