-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
remote control #7
Comments
Is this the remote for the ring light? If so, very interesting. I'm amazed that the little remote control can do all the BLE handshake business and command the light. There is the ability to "pair" a given remote with a given light. Perhaps the key exchange happens as part of that pairing process and that's how they work? The other alternative that I can think of is that it uses some kind of car key like rolling codes. They have a portion of unencrypted data and a portion of encrypted data: https://en.wikipedia.org/wiki/Rolling_code |
I think these remotes form part of the Zengge BLE Mesh. If so, then yes, all the traffic is encrypted, you can only get the key, password, and token required to communicate with these devices from the "Magic Hue" cloud. First off, have you tried the Hao Deng app to see if it can detect the remote and pair with it etc.? What is your use case for the remote? I don't think you can use the remote as a way of controlling other devices it will only control paired devices from the same manufacturer. |
I just tried it - my remote (the same as the photo in the repo's readme) seems to be state-less. The Hao Deng app can't detect it, since I can't put the remote into a "pairing mode", as required in the pairing wizard. Use case: I'm using these remote + controllers for already almost 1000 of my fiber optic fanny packs and backpacks (nebulite.berlin), I'd like to also use them for WLED on esp32, used in my jackets, vests, and kimonos. If I can crack the code, it will be easy since I can already see the advertisement packets on a test sketch on esp32. |
heyho!
I tried to analyse the "RF" remote control (which is actually BLE), but it's super difficult and I've come to block in the road.
I captured these BLE packets from it.
I pressed the same button over and over again - and a lot of bytes change each time.
the bytes that stay the same also stay the same if I press a different button - so I assume that the actual payload is encrypted and uses an incremental counter as well as some passphrase as key.
does anybody have an idea how to decrypt this?
https://chat.openai.com/share/94d056af-2970-4735-8b3d-196af5674094
chatgpt also had no idea how to proceed.
I even found the SDK of the MCU in the LED controller, but it doesn't seem to contain any crypto functions.
http://www.tr3ma.com/Dati/reverse_engineering_elm327_yichip_yc1155.zip
The text was updated successfully, but these errors were encountered: