crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data collected from the pairing process, the STK (Short Term Key) and later the LTK (Long Term Key) can be collected.
Author
CrackLE Limitations
Install CrackLE
Install dependencies
sudo apt-get install libpcap-dev
Clone the GitHub repo
git clone https://github.com/mikeryan/crackle.git
make
sudo make install
Use CrackLE
crackle -i input.pcap -o decrypted.pcap
crackle -i <file.pcap>
crackle -i <file.pcap> -o <output.pcap>
crackle -i <file.pcap> -o <out.pcap> -l <ltk>