btlejack
btlejack copied to clipboard
Malformed Packages in wireshark
I am trying to sniff a new Connection from my smartphone to a smart Lock.
My setup is a Kali Linux Laptop (No VM) 3 Micro:Bits and the 2 devices. I typed into my console "btlejack -c any -o newCon.pcap". And when i look into the new File that got created I see a lot of Packages, but i would say at least 50 % are Malformed or Unknown. My Plan was to read the STK that has to get transferred and via crackle this should be rather easy. If the File would be good.
Am I doing something wrong or is this a known Problem?