You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
From all the tries I've done I conclude that once the SDP query is done the exploiter wants to restart the connection instead of continuing into the pairing phase where the KNOB attack takes place. Am I missing something?
Since the source code of the exploiter is not public, I can not debug exactly what the problem is as the coredump from the segfault indicates some kind of problem related to the threads I assume the binary creates to perform the BT connection.
Can you help me with that?
The text was updated successfully, but these errors were encountered:
I am trying to run the Knob attack using
bt_exploiter
. However when the ESP32 tries to do the connection I get the following:From all the tries I've done I conclude that once the SDP query is done the exploiter wants to restart the connection instead of continuing into the pairing phase where the KNOB attack takes place. Am I missing something?
Since the source code of the exploiter is not public, I can not debug exactly what the problem is as the coredump from the segfault indicates some kind of problem related to the threads I assume the binary creates to perform the BT connection.
Can you help me with that?
The text was updated successfully, but these errors were encountered: