1
0
mirror of https://github.com/oliexdev/openScale.git synced 2025-08-22 08:13:43 +02:00

Use openScale to get list of services

Erik Johansson
2018-11-17 20:20:53 +01:00
parent 54e74052a8
commit e3551335e6

@@ -9,10 +9,12 @@ The general procedure of reverse engineering a Bluetooth 4.x scale is as follow:
6. Do step 1-5 at least three times again but with different weights (e.g. weight yourself while holding a crate of beer)
#### 2. Find out the Bluetooth services and characteristic
1. Install [BLE Scanner App](https://play.google.com/store/apps/details?id=com.macdom.ble.blescanner) by Bluepixel Technology LLP
2. Scan and connect to the scale with this app
3. Note down all UUID numbers of services and characteristic which are not `Device Information`, `Generic Access` and, `Generic Attribute`
4. Additionally note down for every characteristic UUID if it readable (R), writeable (W) and/or have an indication flag (I)
1. Install the openScale [development version](https://github.com/oliexdev/openScale/releases/tag/travis-dev-build).
2. Go to settings, about and enable debug log.
3. Then go to settings, Bluetooth and search for your scale.
4. Once found, click on it and openScale will then fetch information about all services and characteristics.
5. Return to settings, about and disable logging. Attach the log together with the btsnoop logs in a GitHub issue.
6. If this for some reason doesn't work you can also try the [BLE Scanner App](https://play.google.com/store/apps/details?id=com.macdom.ble.blescanner) by Bluepixel Technology LLP.
#### 3. Analyse the Bluetooth protocol
1. Open your first `btsnoop_hci.log` with wireshark version > 1.10