Where communities thrive


  • Join over 1.5M+ people
  • Join over 100K+ communities
  • Free without limits
  • Create your own community
People
Repo info
Activity
    ripemd
    @ripemd
    Hi, thank you for pointing me to this chat
    [roscoe]
    @rsc-dev
    you welcome
    ripemd
    @ripemd
    So I've started analyzing the used Polar protocol last year, because i was sick of Polar Flow
    [roscoe]
    @rsc-dev
    This message was deleted
    smkresearch
    @smkresearch
    Hi thank you for your quick respons. We are just interested in the heartbeat files . As I mentioned I have no experience with python. When I get a file from the polar device is it already decoded with the protocolbuffer or do I have to do some work to convert the heartbeat file into a txt file ?
    [roscoe]
    @rsc-dev
    I created new project - https://github.com/rsc-dev/A360. It aims to be a Polar devices data decoder. Under development.
    PowPingDone
    @PowPingDone
    does this only dump properties?
    Dub Monster
    @DubMonster590_twitter
    hi, anybody here
    how i can run that file
    [roscoe]
    @rsc-dev
    @PowPingDone: It dumps all device memory
    @DubMonster590_twitter: strat with python main.py
    nibornosskire
    @nibornosskire
    Hi! Trying to find where/if notifications are stored on the device! Could you give me a hint where to find these? I guess just a short amount of the total message are present, like the lenght showed on the display when notifications are received..
    [roscoe]
    @rsc-dev
    Hi. I think that notifications are not stored on file system. In protocol_buffers/pftp you will find notifications descriptor. It means, that notifications are send directly via pftp (using BT or USB) from other device (phone). Some standard notifictions should be stored in FW.
    david-garay
    @david-garay
    Hi @rsc-dev , should you still be busy with this project, I have a couple of questions, from the forensics perspective - in your experience, do you expect APIs to be available for an image dump of the device? If I am not wrong, loophole does a walk followed by a series of gets, right? I wonder if the reset-to-factory settings would have the same behavior during backup OR another mechanism would be used. Additionally, I wonder if you got to decode .proto protocol with wireshark? I get to see the USB/URB files, but the pftp payload is left encoded.
    Also: do you recon there are .proto files not present in loophole? I checked today the version 4.0.8 of the flow app and I have the impression there might be more.
    Excuses for the many questions and thank you in advance!
    [roscoe]
    @rsc-dev
    @david-garay - sorry for such a late response. Unfortunately I do not have enough time to work on this project anymore. AFAIK image dump will not be ever available via this vector. You are right with "walk-get". I am aware that each new version of flow app will contain new protoc files. I hope someone can pick it up and reverse those.