8000 Update source/_integrations/private_ble_device.markdown · home-assistant/home-assistant.io@2a4bb40 · GitHub
[go: up one dir, main page]

Skip to content

Commit 2a4bb40

Browse files
Update source/_integrations/private_ble_device.markdown
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
1 parent 702e4de commit 2a4bb40

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

source/_integrations/private_ble_device.markdown

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,10 @@ If you have a rooted Android phone, the IRK (and LTKs) can be viewed in the file
4747
Alternatively, the IRK of an Android phone and/or secondary device can be obtained using Wireshark:
4848

4949
1. On the Android phone, enable "USB Debugging" and "Enable Bluetooth HCI snoop log" options in developer settings.
50-
2. Ensure a second bluetooth device (e.g smart watch or earbuds) is unpaired
51-
3. Disable and re-enable bluetooth on the phone then re-pair the secondary device
50+
2. Ensure a second Bluetooth device (e.g., smart watch or earbuds) is unpaired
51+
3. Disable and re-enable Bluetooth on the phone then re-pair the secondary device
5252
4. Connect the Android phone to a computer with [adb](https://developer.android.com/tools/adb) installed
53-
5. Estabhlish an adb connection (`adb connect...`) then run the command: `adb bugreport scanwatch`
53+
5. Establish an adb connection (`adb connect...`) then run the command: `adb bugreport scanwatch`
5454
6. In the generated `scanwatch.zip` file, locate and extract `FS\data\misc\bluetooth\logs\btsnoop_hci.log`
5555
7. Open `btsnoop_hci.log` in [Wireshark](https://www.wireshark.org/download.html) and search for `btsmp.id_resolving_key`
5656
8. Select one of the frames and expand the "Bluetooth Security Manager Protocol". Either the sending or receiving device IRK will be visible in the hex dump.

0 commit comments

Comments
 (0)
0