Stealing Firmware from Over-The-Air Updates

Security researchers often need access to closed-source firmware for proprietary hardware, which can be obtained by intercepting firmware from updater apps that use Bluetooth for over-the-air updates. This process involves downloading the updater app, reverse engineering it to find the update server and authentication information, and then spoofing the app to retrieve the firmware. This method can be particularly useful when physical access to the hardware is not possible.

*****
Written on