Replies: 1 comment 3 replies
-
Are you trying to exploit a computer running macOS or a remote device running iOS? In either case, I highly doubt it could be done with Bleak. You would need much lower level control over the Bluetooth messages. Is there a known exploit you are trying to take advantage of? |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Possible Apple Exploits
Using the sample "service_explorer.py" in my own program, I was able to recieve a result that looks like this:
My goal is to be able to exploit my Apple device and to be able to shut it down remotely or any exploitations you can recommend. How is that possible?
What I Did
I don't exactly know if there are dependencies around this, but I just want to improve my program. The exploit I've added is buffer overflow but I'm also not sure if that will work. This program is a combination of all the examples given with all the handlers. I just want to write_gatt_char on my Apple device and to be able to exploit it.
Logs
This program works smoothly if there are not write actions. But when write__gatt_char is applied, I get empty line then skips to another device since it is in while true loop. Can you please help me with this?
Beta Was this translation helpful? Give feedback.
All reactions