{"id":52,"date":"2007-08-16T17:54:18","date_gmt":"2007-08-16T15:54:18","guid":{"rendered":"http:\/\/www.evilgenius.de\/2007\/08\/16\/write-your-own-csr-firmware\/"},"modified":"2018-07-02T18:28:36","modified_gmt":"2018-07-02T16:28:36","slug":"write-your-own-csr-firmware","status":"publish","type":"post","link":"https:\/\/www.evilgenius.de\/?p=52","title":{"rendered":"Write your own CSR Firmware!"},"content":{"rendered":"<p><a href=\"http:\/\/darkircop.org\">Darkircop<\/a> have released their <a href=\"http:\/\/darkircop.org\/bt\/bt.tgz\">tools<\/a> for reverse engineering CSR Firmware. The tools include a disassembler <code>dis.c<\/code> for disassembling official firmware. An assembler <code>as.cc<\/code> for writing your own firmware is also included. With these tools you are now able to write your own firmware for your CSR based Bluetooth Dongle, which might even include raw access for Bluetooth sniffing. The source code for sniffing Bluetooth under Linux included, too.<\/p>\n<p>It might even be possible to port the techniques for finding hidden Bluetooth devices described in <a href=\"http:\/\/darkircop.org\/bt\/gnuradio\/Bluesniff.pdf\">this paper<\/a> onto a CSR dongle. In the paper <a href=\"http:\/\/www.gnu.org\/software\/gnuradio\/\">GNU Radio<\/a> with <a href=\"http:\/\/www.comsec.com\/wiki?UniversalSoftwareRadioPeripheral\">USRP<\/a> was used. The source code used for this attack can be <a href=\"http:\/\/darkircop.org\/bt\/gnuradio\/gr-bluetooth.tar.gz\">downloaded<\/a>, too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Darkircop have released their tools for reverse engineering CSR Firmware. The tools include a disassembler dis.c for disassembling official firmware. An assembler as.cc for writing your own firmware is also included. With these tools you are now able to write your own firmware for your CSR based Bluetooth Dongle, which might even include raw access &hellip; <a href=\"https:\/\/www.evilgenius.de\/?p=52\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Write your own CSR Firmware!<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,10,5],"tags":[],"class_list":["post-52","post","type-post","status-publish","format-standard","hentry","category-bluetooth","category-hacking","category-security"],"_links":{"self":[{"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=\/wp\/v2\/posts\/52","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=52"}],"version-history":[{"count":1,"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=\/wp\/v2\/posts\/52\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=\/wp\/v2\/posts\/52\/revisions\/254"}],"wp:attachment":[{"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=52"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=52"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.evilgenius.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=52"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}