• caglararli@hotmail.com
  • 05386281520

Intercepting Bluetooth LE communication with an app on the same mobile device

Çağlar Arlı      -    36 Views

Intercepting Bluetooth LE communication with an app on the same mobile device

I'm thinking about man-in-the-middle attacks on a BLE connection ... normally when people talk about MITM attacks it's a separate device that sits between the mobile phone/tablet and the BLE device, which immediately limits its effectiveness (the attacker must be physically near the two devices). Can an attacker write an app that gets installed on the same mobile phone/tablet as the real app, and somehow intercepts the BLE SDK calls and thus becomes a man-in-the-middle that is always there?