-
-
Notifications
You must be signed in to change notification settings - Fork 300
How to reverse engineer a Bluetooth 4.x scale
OliE edited this page May 8, 2022
·
5 revisions
The general procedure of reverse engineering a Bluetooth 4.x scale is as follow:
- Enable developer options if not already done so
- Delete first on your smartphone any old
btsnoop_hci.log
- Activate the
Bluetooth HCI Snoop Log
developer option on the smartphone - Disable and enable bluetooth to start logging
- Weight yourself with the original app and note down the corresponding exact true date/time with all other information (e.g. weight, water percentage, bone mass and so on). Also note your user information like sex (male/female), body height, activity level, and age.
- Do step 1-5 at least three times again but with different weights (e.g. weight yourself while holding a crate of beer)
- Deactivate the
Bluetooth HCI Snoop Log
developer option - Save the
btsnoop_hci.log
with a meaningful filename- Enable
USB debugging
developer option on the smartphone - Issue
adb.exe bugreport .\debugdata
on the PC for Windows oradb bugreport .\debugdata
for Linux - From
debugdata.zip
file created at previous step, get thebtsnoop_hci.log
; the file can be found in archive inside directoryFS\data\misc\bluetooth\logs\
- Enable
- Install the openScale development version.
- Go to settings, about and enable debug log.
- Then go to settings, Bluetooth and search for your scale.
- Once found, click on it and openScale will then fetch information about all services and characteristics.
- Return to settings, about and disable logging. Attach the log together with the btsnoop logs in a GitHub issue.
- If this for some reason doesn't work you can also try the BLE Scanner App by Bluepixel Technology LLP.
- Open your first
btsnoop_hci.log
with wireshark version > 1.10 - Search for the true values in the log files. A good starting point is to search for the weight
- Convert your decimal weight into a hex value (ignore any comma. The value is divided by 100 or 10 afterwards) for example if the weight is
75,3 kg
then the hex value is02F1
in big-endian orF102
in little endian - Look for the weight value in little endian format which is send from the scale to the app (source should be
remote()
and destinationlocalhost()
)
- Convert your decimal weight into a hex value (ignore any comma. The value is divided by 100 or 10 afterwards) for example if the weight is
- If you have found a value string that contains the weight try to find in this string other values as well (e.g. water percentage and date/time)
- Decoding the date/time is the most difficult part because the format is unknown. It could be a unix time stamp or something different. A good free tool to help you to identify the used time format is DCode by digital detective
- Next we have to find out which steps are needed for the scale configuration to trigger the scale to send us the values
- Search in wireshark for the first data package from the scale which contains your weight value
- Now analyse previous data packages and see and note down what values was written to which characteristic UUID (source should be
localhost()
and destinationremote()
) - Note also down which UUID notification flag or indication flag was set enabled