commands.sh

crackle

all

Crack and decrypt Bluetooth Low Energy (BLE) encryption.

More info →

Examples (3)

Check whether the recorded BLE communications contain the packets necessary for recovering temporary keys (TKs)

crackle -i path/to/input.pcap

Use brute force to recover the TK of the recorded pairing events and use it to decrypt all subsequent communications

crackle -i path/to/input.pcap -o path/to/decrypted.pcap

Use the specified long-term key (LTK) to decrypt the recorded communication

crackle -i path/to/input.pcap -o path/to/decrypted.pcap -l 81b06facd90fe7a6e9bbd9cee59736a7
made by @shridhargupta | data from tldr-pages