View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006147 | Kali Linux | Queued Tool Addition | public | 2020-02-26 23:27 | 2020-11-11 23:48 |
Reporter | g0tmi1k | Assigned To | sbrun | ||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | resolved | Resolution | fixed | ||
Fixed in Version | 2020.4 | ||||
Summary | 0006147: apple_bleee - Apple BLE research | ||||
Description | [Name] - apple_bleee [Version] - v0.1.5 [Homepage] - https://github.com/hexway/apple_bleee [Download] - https://github.com/hexway/apple_bleee/releases [Author] - hexway [License] - GNU General Public License v3.0 ~ https://github.com/hexway/apple_bleee/blob/master/LICENSE [Description] - These scripts are experimental PoCs that show what an attacker get from Apple devices if they sniff Bluetooth traffic. [Dependencies] - bluez libpcap-dev libev-dev libnl-3-dev libnl-genl-3-dev libnl-route-3-dev cmake libbluetooth-dev + https://github.com/hexway/apple_bleee/blob/master/requirements.txt [Similar tools] - None [Activity] - 25 Jul 2019 ~ Jan 17, 2020 | ||||
Date Modified | Username | Field | Change |
---|---|---|---|
2020-02-26 23:27 | g0tmi1k | New Issue | |
2020-02-26 23:28 | g0tmi1k | Status | new => confirmed |
2020-02-26 23:28 | g0tmi1k | Status | confirmed => acknowledged |
2020-10-16 12:01 | sbrun | Assigned To | => sbrun |
2020-10-16 12:01 | sbrun | Status | acknowledged => assigned |
2020-10-21 08:11 | sbrun | Note Added: 0013578 | |
2020-10-29 15:41 | sbrun | Status | assigned => resolved |
2020-10-29 15:41 | sbrun | Resolution | open => fixed |
2020-10-29 15:41 | sbrun | Note Added: 0013598 | |
2020-11-11 23:48 | g0tmi1k | Fixed in Version | => 2020.4 |