Skip to content

bWanShiTong/reverse-engineering-whoop

Folders and files

NameName
Last commit message
Last commit date

Latest commit

64e3440 · May 20, 2024

History

31 Commits
May 20, 2024
May 11, 2024
Apr 28, 2024
Apr 28, 2024
May 12, 2024
May 12, 2024
May 11, 2024
May 5, 2024
Apr 23, 2024
May 5, 2024
May 20, 2024
May 12, 2024
May 20, 2024
Apr 10, 2024

Repository files navigation

Reverse Engineering Whoop 4.0

This is my attempt to reverse engineer Whoop 4.0,

Data fetching

Packets can be obtained with app found in record-app, app finds device whose name starts with WHOOP and subscribes to all characteristics to get data, which can be transferred with server.py.

Or using extract-logs.sh and parse_pcap.py to get bluetooth logs from android using adb.

Data decoding

Notes of decoding can be found in DECODING and functions that decode in misc.py.

Current Progress

Some of write commands have be identified but I can identify algo used to calculate checksum, so I can't test these commands. Currently it seems that sending aa0800a8230e16001147c585 to 61080002-8d6d-82b8-614a-1c8cb0f8dcc6 returns last few minutes of values.

Repo attempting to emulate whoop can be found here

About

No description or website provided.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published