![]() ![]() It downloaded the data and uploaded it to my own Nike profile. To download data from Nike+ Sportband on Windows I had to use Nike + Connect. Nike+iPod reverse engineering (protocol too) Information retrieval from a TomTom Nike+ smart watch ![]() This work is not finished, but I have decided to publish the code written so far. Using the PyUSB I have translated these two codes into Python to extract data from my Sportband. The second project is a complete reverse engineering of the protocol: it is possible to edit nickname, time, weight, other information and extract the data of the runs in hex format, but it does not read them in clear text. The first project allows to download data in hex format and convert it in clear text. These two projects are a complete reverse engineering of the Nike+ Sportband protocol. I have found two old open source projects (~2011), written in C/C ++, for Linux users. I still use Nike+ Sportband and I am a Linux user, so I looked for an alternative solution. In April, 2018, Nike finished to support some old products, so it is no longer possible to download data from old running watches, such as Nike + Sportband. Nike+ Sportband Reverse Engineering Premise ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |