Hacking a NutriBullet blender via BLE: reverse-engineering the protocol and adding extra speed 👨🏻‍💻❯❯🥤🌀💥

1 min read Original article ↗

Security researcher Ryan Mast shares his journey of reverse-engineering a Bluetooth-controlled NutriBullet Balance smart blender after its official app stopped working on newer phones.

In short steps, Author:

1️⃣ inspected the blender’s services and characteristics,

2️⃣ sniffed and logged Bluetooth traffic,

3️⃣ decoded the binary commands that control blending speed and timing,

4️⃣ analyzed the Android app to confirm the findings,

5️⃣ built a custom web-based Bluetooth app that can fully control the blender,

6️⃣ and added some extra speed :)

By the way, the blender doesn’t authenticate Bluetooth connections at all - any nearby device can send it commands as long as it’s in range.

A creative and very interesting example of BLE security research for SOHO devices. It may be useful as a learning example as well.

More details:

The Perfect BLEnd: Reverse engineering a bluetooth controlled blender for better smoothies [Youtube]: https://lnkd.in/eHx7phJN

Discussion about this post

Ready for more?