The project is a proof of concept of utilizing the vulnerability of a man-in-the-middle attack, by impersonating a BLE keyboard and control all traffic in between using Texas Instruments CC-2650 LP evaluation boards. Submitted by Mattan Serry, Sharon Lifshits and Hila Balahsan as a final project in the Advanced Computer Systems course, The Computer Science Master's Program, Tel-Aviv University, 2018.
Requirements:
- Code Composer Studio 7.4.0 and BLE SDK 2.02.01.18 with these modifications.
- CC-2650 LP board running the Simple Central application with these modifications, acting as fake computer.
- CC-2650 LP board running the HID Emu Kbd application with these modifications, acting as fake keyboard.
Detailed walkthorugh and project presentation can be found here. A demo video in Hebrew can be found here.
The original BLE SDK is copyrighted under the BSD-3-Clause license:
Copyright (C) 2016 Texas Instruments Incorporated - http://www.ti.com/
Furthermore, every source file begins with a copyrights decleration. Our modifications are also under the BSD-3-Clause. If you redistribute our source code, please retain all copyrights and licensing information.