Xeno Kovah

@xenokovah@infosec.exchange
128 Followers
9 Following
106 Posts
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of @OpenSecurityTraining2 https://ost2.fyi
While I’m working on the Blue2thprinting class, I just checked in an update to attempt lookup of UUID16s as a possible Standards Development Organization, and this adds some interesting additional signal when trying to figure out what something might be
Cryptographers working on double ratchet algorithms
Sneak peek at the draft #OST2 Bluetooth Security Learning Path! If you want to beta test the BT3001 class, you’re highly encouraged to finish https://ost2.fyi/Vulns1001 & https://ost2.fyi/Vulns1002 ASAP!
Went to an Amazon Fresh store a while back & was disappointed to find their Electronic Shell Labels (Model EL042F6W4A according to that QR code) use 2.4GHz but a “SOLUM proprietary protocol” https://manuals.plus/solum/el042f6w4a-newton-electronic-shelf-labels-manual A good research topic for someone other than me perhaps…
MCP? SMH! Those who do not learn history are doomed to repeat it!

Those "hacked" crosswalk buttons last week were most likely just things that hadn't changed the default password (from "1234"), and then someone used the Polara app to upload new audio (which is part of its core functionality.) Today I decompiled the Android app and added the UUIDs (pic1) to CLUES: https://github.com/darkmentorllc/CLUES_Schema

So now Blue2thprinting https://github.com/darkmentorllc/Blue2thprinting, and other tools that use CLUES, like WHAD https://github.com/whad-team/whad-client, can more easily identify Polara BLE-enabled crosswalks.

If the assumption is that the devices which were maliciously modified were not reconfigured away from default, then it would be reasonable to assume that devices which still have default names matching the patterns shown in pic2, are more likely to be vulnerable. And of course @WiGLEnet shows plenty of hits for such devices. And indeed, I used WiGLE to go drive to an intersection one county over and confirm that the 4x default-looking devices there were indeed broadcasting the Polara UUIDs (since WiGLE doesn't report the UUIDs, which would be useful for confirmation.)

Thanks to Mike Ryan @mpeg4codec for pointing out a video from Deviant Ollam @deviantollam from last year which made it more obvious what was going on. https://www.youtube.com/watch?v=mvvVSTlbqEI

GitHub - darkmentorllc/CLUES_Schema: Custom Lightweight UUID Exchange Schema (CLUES!)

Custom Lightweight UUID Exchange Schema (CLUES!). Contribute to darkmentorllc/CLUES_Schema development by creating an account on GitHub.

GitHub
. @VeronicaKovah and I have a new class on Bluetooth Low Energy security which we're teaching at hardwear.io May 27-29: https://hardwear.io/usa-2025/training/bluetooth-low-energy.php. In the class we walk through the entire BLE stack to show you where all the bodies (and attack surfaces) are buried.💀 With over 5 billion devices per year sold that support BLE, this is an important attack surface to understand!
Bluetooth Low Energy - Full Stack Attack | Veronica & Xeno Kovah | hardwear.io USA 2025

In this training by Veronica Kovah & Xeno Kovah, you will learn how to use fault-injection to do just that. You will learn how to use techniques such as crowbar glitching, spiking and electro-magnetic fault injection to bypass a diverse set of protections, including re-enabling the debug interfaces on microcontrollers, bypassing firmware security measures and recovering AES keys by glitching AES rounds.

Google’s not dead yet…even the LLMs that google for things don’t actually *Google* for them…
See, I knew if I posted it I’d end up finding it ;) The answer appears to be that the names come from the section headings of the BT specs v1.0B-v1.1 (removed in v1.2). I just had never bothered to download earlier than v2.0 before (which I checked back to)
From: @xenokovah
https://infosec.exchange/@xenokovah/114055921337012221
Xeno Kovah (@xenokovah@infosec.exchange)

I’ve been trying to find a citation for this but haven’t been able to yet: does anyone know where the BT HCI transport layer protocol commonly-used short names like “H4” or “H5” originally came from? (They’re certainly not in the specs…)

Infosec Exchange
@xenokovah Bonus: when I first arrived on day 1 I didn’t know the power was still out. I just thought the parking garage next to the hotel was the sketchyest one I’d ever seen…