From 2ba515b5665015871114bc9dc2c66d68c0abdddd Mon Sep 17 00:00:00 2001 From: sudiptac Date: Mon, 6 Sep 2021 14:14:45 +0800 Subject: [PATCH] Update README.md --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 8179b86..74e132e 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,8 @@ This is a reverse engineered **active** BR/EDR sniffer and ESP32 patching framework (soon to be open-sourced), which can be used to explore the Bluetooth (BT) BR/EDR interaction between ESP32 controller and a remote target. Differently than **passive** sniffers, which do not interact with the BT network (piconet), the **active** sniffer connects itself to the remote BT device (BR/EDR target) and allows testing of BT protocol down to the Baseband layer in a quick and simple way by using a third-party BT host stack such as **[blue-kitchen](https://github.com/bluekitchen/btstack)**. The *BrakTooth* sniffer makes use of cheap boards such as ESP32-DOIT or ESP32-WROVER-KIT. -This project was inspired by [*InternalBlue* BT patching framework](https://github.com/seemoo-lab/internalblue). We have extended their [Wireshark plugin](https://github.com/seemoo-lab/h4bcm_wireshark_dissector) (`dissectors/h4bcm dissector`) to support few more BT layers and our custom ESP32 metadata header. Thanks [@jiska2342](https://github.com/seemoo-lab/h4bcm_wireshark_dissector/commits?author=jiska2342). + +The dissection of Baseband packets extends the [*InternalBlue* Broadcom Wireshark Dissector](https://github.com/seemoo-lab/h4bcm_wireshark_dissector). Specifically, we have extended the h4bcm Wireshark plugin to support a few more BT layers and our custom ESP32 metadata header. Thanks [@jiska2342](https://github.com/seemoo-lab/h4bcm_wireshark_dissector/commits?author=jiska2342). ### Simplified Setup Overview