BLE Spam add Android FastPair spam

Co-authored-by: Spooks <62370103+Spooks4576@users.noreply.github.com>
This commit is contained in:
Willy-JL
2023-10-15 18:53:31 +01:00
parent 0465f3ca31
commit 74c3ab88d9
7 changed files with 103 additions and 3 deletions

View File

@@ -7,7 +7,8 @@
// Hacked together by @Willy-JL
// Custom adv API by @Willy-JL (idea by @xMasterX)
// iOS 17 Crash by @ECTO-1A
// Research on behaviors and parameters by @Willy-JL and @ECTO-1A
// Android Pairs by @Spooks4576 and @ECTO-1A
// Research on behaviors and parameters by @Willy-JL, @ECTO-1A and @Spooks4576
// Controversy explained at https://willyjl.dev/blog/the-controversy-behind-apple-ble-spam
typedef struct {
@@ -84,6 +85,19 @@ static Attack attacks[] = {
},
},
},
{
.title = "Android Device Pair",
.text = "~15min cooldown, long range",
.payload =
{
.random_mac = true,
.protocol = &ble_spam_protocol_fastpair,
.msg =
{
.fastpair = {},
},
},
},
};
#define ATTACK_COUNT ((signed)COUNT_OF(attacks))
@@ -242,7 +256,7 @@ static void draw_callback(Canvas* canvas, void* ctx) {
AlignTop,
"App+Spam: \e#WillyJL\e# XFW\n"
"Apple+Crash: \e#ECTO-1A\e#\n"
"\n"
"Android: \e#Spooks4576\e#\n"
" Version \e#2.0\e#",
false);
break;