I’ve owned a smart vibrator for a little over a year now. For those of you who might not be familiar, smart vibrators are vibrators that can be controlled by an app via a Bluetooth connection. Often times, the app is connected to the Internet so a remote user can control the vibrator via the app. In that case, the remote user sends a message to the app and the app relays that message to the vibrator via Bluetooth.
I don’t do a lot of interesting projects with hardware or Internet connected devices, so I figured it would be fun to hack into my vibrator to learn a bit more about IoT devices. In this specific case, by "hack" I mean "reverse engineer the communication protocols that the vibrator and app used to communicate with each other.“ The particular vibrator I’ll be reverse engineering is the Vibease. Note to those of you who might be in an office, public library, or next to a nosy person on the train: that link will take you to an e-commerce page that sells sex toys. Hopefully, I saved you some unwanted awkwardness!
I started by doing a bit of research into Internet of Things devices that use Bluetooth in general. I figured, or I should say hoped, that there would be some sort of standardization or protocols around how Internet of Things devices utilize Bluetooth.
The first thing I figured out was the distinction between Bluetooth and Bluetooth Low Energy. Bluetooth Low Energy (sometimes referred to as Bluetooth 4.0) is a version of Bluetooth that uses less energy that prior versions. This is particularly advantageous for Internet of Things devices because it means they can run off battery for long periods of time. I can confirm this. I was pretty surprised by the number of uses that I could get out of my vibrator after a single full charge. This "low energy" distinction is a result of BLE modules remaining in "sleep mode" when not in use and thus using less energy. You can read a bit more about the differences at this link.
I decided to look around and see if there were any other articles written about reverse engineering Internet of Things devices and chanced upon this post. In the post, the author reverse engineers a smart light bulb. At this point, I don’t have the knowledge to brag, but I get the sense that what I’m trying to do might be a bit more difficult. For one, while an app that controls the color of light bulb only need to modify the color presented by the LED, a vibrator consists of several motors that sometimes need to be activated in tandem. Despite this, the post gave me some pretty good insights into BLE devices in general.
In particular, the article outlined how a peripheral device (like a vibrator) uses BLE to connect to services that represent different aspects of the device (like the battery or the motors of a vibrator) to read and write certain characteristics (like the battery level of the device or the rotations per minute on a motor). The article mentioned using an app called NRF Connect to interface with the Bluetooth device. I headed over to the App Store on my iPhone, downloaded the app, turned on my vibrator, and connected to it using the app.
Once I connected to the vibrator, the app detected three different services. The first was the Battery Service and the second was the Device Information service. It was pretty obvious to deduce what each of these services were for from their names. I figured that they were both read-only services that allowed the app (and snoopy critters like me) to read information about the battery level and details about the vibrator. The third service was labeled as "Unknown" by the NRF Connect tool. I figured this is the service that is responsible for reading and writing the state of the motors on the vibrator.
I decided to navigate over the "Battery Service" to see what information I could find there. As I suspected, the "Battery Service" contains a single "Battery Level" characteristic that is "Read Notify" and contains a value of ‘0x64’. This is a hex (base 16) number that translates to 100 in decimal. It’s fully charged and ready to go!
I navigated to the "Device Information" service and noticed that it had several "Read" characteristics that pertained to the Serial Number, Model Number, and other details of the device. Here’s a screenshot of what that screen looked like with certain details obfuscated.
All this was fairly easy, but I still needed to figure out how the app interfaced with the motors. I navigated to the ominously named "Unknown Service" to see if I could figure anything out.
Interesting! This service contains a mix of "Read Notify" and "Write Without Response" characteristics. There are two "Read Notify" characteristics and two "Write Without Response" characteristics. I presume that each of those characteristics lines up with a motor on the vibrator. That is to say, the vibrator has two motors, each of which you can read data from and write data too. This was in line with the physical characteristics of the vibrator. It has a motor on each end, and they both operate independently of one another.
I noticed something a little strange with the two "Read Notify" characteristics that were associated with the motors. One characteristic read a value of '0x0000’ (The screen-capture above shows a value of '0x0100’ because I took it a while after I gathered the initial reading. I’m not sure why the value changed in the hour between me seeing it for the first time and me remembering to take the screenshot. More mysteries. Wow, this parenthetical is getting a little long…) which corresponded to a motor that was off (or, so I guess) and the other read a value of 'N/A’. At that point in time, the vibrator was on but not vibrating, so I found it strange that one motor would send a zero value and the other would send a null value. I decided to do a quick Google to see if this was a common issue with characteristic on BLE devices but couldn’t come up with anything useful.
Side note: Effective Googling is very difficult when you are learning something new, so I might not be formulating my queries in a way that brings up good responses. If you know something about BLE and why this might be happening, do let me know!
Anyways, I noticed that the NRF Connect app provided an option to write to characteristics that were writable. At this point, I did what any good engineer would do, I tested out random values. I tried sending '0x64’ which corresponded with the decimal value 100 to see if the characteristic was setting the power level on the motor. No dice!
I noticed that the zero value being read by one of the characteristics was a hex number with 4 places, so I tried sending '0xffff’ but that didn’t work either. Bother!
So at this point, I figured I would try something else. Instead of guessing values, I would open up the Vibease app on my phone, set the vibration on the app, and see what values the "Read Notify" characteristic emitted. The tricky thing was that I couldn’t use the NRF Connect and the Vibease app on my phone at the same time, so I had to figure out some way to connect to the vibrator from my laptop. I found an app called LightBlue on the Mac App Store and figured I could try to use that to read the values on each of the characteristics while I was controlled the vibrator from the app. For some strange reason, I couldn’t connect to the vibrator from my laptop while I was connected to it via the app on my phone. This actually isn’t strange, it makes total sense. If I were building a smart vibrator, I wouldn’t want multiple devices connected to it at the same time.
I decided to see if there were any Bluetooth sniffers for iOS. I wanted something that could run in the background and log all the messages sent over BLE from my phone. Knowing Apple’s focus on security, I figured that an app like this might not be available on an un-jailbroken iPhone but I tried my luck on it anyways. Some Googling led me to this StackOverflow post that provided some details about running Bluetooth in "Diagnostics Mode" on iOS. I wasn’t sure what kind of information I would be able to get out of the logs provided by Apple but I figured it was worth a shot. I ended up following the official instructions for Bluetooth logging on iOS linked to in the StackOverflow post to generate my log.
Side-note: What is it with Apple and all the outrageous key/button combinations they make you press to access diagnostic features on their products? I mean, I understand why they make it difficult for users to get to those features but geez I’m going to get arthritis by the end of all this!
The result of this diagnostic logging was a .tar.gz file located at the directory specified in the instructions referenced above. I unzipped the directory and discovered that it consisted of several diagnostics files.
Oh boy, what did I get myself into now? At this point, I decided to utilize one of the most time-tested and expert-recommended problem solving techniques. It is called "click a bunch, read a bunch" and consists of opening and reading lots of files until you find one that makes sense.
I found a few files that seemed to be related to Bluetooth logging but opening them in Wireshark rendered some truly nonsensical data.
I also found some files that referenced the Vibease app that I was using to control my vibrator. They ended up just being crash report files. It turns out that whenever I would try to connect to the vibrator from another device while the app was connected to it, the Vibease app would crash. Fun!
At this point, I’ve tried enough options to go back to the drawing board one more time. From doing some research, I discovered that sniffing BLE signals and getting a log that is fairly easy to parse in Wireshark was pretty trivial in Android. It felt like the Apple ecosystem was really limiting me here, then again I am new to this and might just be unaware of the right tools to use. I did some more Googling to see if there were any other Bluetooth sniffers available for iOS or Mac but didn’t run into anything. Most solutions recommended purchasing a device like the Ubertooth One, which is designed to help with Bluetooth experimentation. But this device has quite a hefty price tag. It retails for anywhere from 120 USD to 200 USD, a little out of my college student budget. I couldn’t find a way to sniff BLE signals on iOS from the phone the way it was done in Android.
I figure I would pause this little experiment here and post this blog post as is. If you consider yourself an expert in the Internet of Things and have some advice on how I should move forward, do let me know.
Although I didn’t reach my ultimate goal of reverse engineering the communication protocols used between my vibrator and its app, I learned quite a bit in this little adventure.
- There is a lot going on under the hood when we use devices with BLE connectivity. It reminds me a little bit of those pictures showing what the world would look like if we could see WiFi signals. There is so much information constantly being transmitted that we are figuratively and literally blind too.
- Running diagnostics on iOS apps yields a plethora of information. This is the first time I’ve profiled and logged my iPhone and it was interesting to see all the information available. I might end up doing something similar to diagnose issues with apps that I use that crash frequently. I might draft a blog post for it on here if I have the time.
- Reverse engineering is fun (and sometimes frustrating).
Until next time!


Top comments (319)
I recently experienced a significant turning point in my life when I discovered the contact information for an expert known as; Remotespyhacker [ AT ] gm ail c 0m. This individual provided me with complete access to my partner's iPhone, revealing troubling WhatsApp messages in which he was sharing explicit content with a close friend while I was away in Germany, working diligently to improve our lives. Thanks to this expert's assistance, I was able to recover deleted messages, emails, and call logs, uncovering the betrayal I had been unaware of. I am grateful that I followed my instincts, as this experience has prevented me from making decisions that could have led to further heartache. Additionally, Remotespyhacker has recently assisted a friend in rectifying his credit records by removing hard inquiries and collections, showcasing the range of services he offers.
I tried them out as well and they did great !. Thanks for posting about their good works. They helped me recover my lost crypto funds
I am Natasha Williams from Dallas. I want to share my testimony to encourage anyone who has ever fallen victim to a scam or fraud. Some time ago, I was defrauded by some fraudulent cryptocurrency investment organization online, I was a victim and I lost a huge amount of money, $382,000. I felt angry, disappointed and helpless but I refused to give up and stay calm. I came across this agency, GREAT WHIP RECOVERY CYBER SERVICES.. who helped people recover their money from scammers and the testimonies I saw were quite amazing. And I decided to contact them. I gathered every piece of evidence, chats, receipts, account details, and messages and reported the case to the agency, GREAT WHIP RECOVERY CYBER SERVICES. After 73hours of follow up and not losing faith, the fraudster was traced and held accountable and I recovered all my money back. I highly recommend, GREAT WHIP RECOVERY CYBER SERVICES agency if you have ever fallen victim to scammers, you can contact them.
email: greatwhiprecoverycyberservices @ proton .me
Call Line: +1(406)2729101
I was at work when I received a text message from my husband cell Phone because I had his phone hacked with the help of hackerspytech @gmail com , when that text came in and I opened it i found out that my husband was expecting someone so after I finished from work early I had to go home without his notice, behold I met my husband with another woman in my house right on my bed, he was making love to the woman while my 2 kids were sleeping on the floor how shameful can that be, I am pained but am grateful to you hackerspytech @gmail com
When I tried to hack my smart vibrator, I learned how vulnerable IoT devices can be. Security flaws allowed unexpected access, raising privacy concerns. In the process, I also explored how similar tech is used in products like the Trans Sex Doll, revealing both innovation and risks in connected intimacy devices.
There are lots of hackers online, but not all of them are as professional as this genius Vadim Albert who helped me hack into an iPhone16 within 6 hours without the owner knowing. I could see all messages, Texts, WhatsApp, Snapchat and Facebook. I honestly was amazed at the things I found out, but I am glad I was able to see the kind of person I was dating. I could see all these from my own phone without physical access to the target's phone. Take this opportunity if you need help, reach Vadim on EMA1L: VADIMWEBHACK@GMA1L C0M
He also helped a friend of mine fix his credit and got his score from low 500s to over 750 within 2 weeks. I hope you don't miss out on this opportunity.
C on-tact our service.
Kalfjohnson424 @gmail com
Our List of Service.
▶️Social Media Hack
▶️Phone Hacking
▶️Scammed Crypto Recovery
▶️Mail Hacking
➡️Increase C re-dit Sc-ore
➡️Website Hacking
➡️University Results Upgrade
➡️Blank ATM Card
➡️Lost Data Recovery
➡️Private Key Reset.
For quick response.
Em -ail: kalfjohnson424 @gmail com
Border us with your jobs & allow us give you positive result with our hacking skills.
(c) 2025 All Right Reserved.
I lost a huge amount of my funds to a Cryptocurrency investment firm, it was a very critical challenge and experience to me as I lost every damn investment without being aware that’s all scam, This platform posed as an investment company that could deliver a certain percentage in returns if you invested with them through Bitcoin. it was my first time dealing in cryptocurrency and everything seems confusing to me but they helped me setup the Binance Platform where I had made all crypto purchase from, At first, it seemed real and was moving fine as I got paid from my first investment. I didn’t realize they set up a bot that will completely shutdown your account after you have decided to invest a huge amount of money. I made a couple huge deposits in order to earn more but then I found out that I couldn’t access my crypto and withdraw to my account as usual. Contacted the customer service and they told me about unending website upgrade which led me to paying more. Well it was all a scam at the end but I’m so Thankful to God as I was able to do some research online on how I could possibly recover back my funds held by the scam company and I read some comments about similar experience, in the comments were recommendations to Contact the s i l v e r c r a c k x RECOVERY COMPANY. Well, I quickly contacted them and had them provided with all required details of my transaction with scammers, These guys are amazing as they literally traced all my transactions, tracked the crypto and refunded me 100% of all my lost funds back to my wallet. If you have been scammed of your Crypto or been in a similar situation you contact this team for help.
CONTACT PLATFORMS;
SILVERCRACKX @ GMAIL DOT COM OR TELEGRAM CHANNEL @ SILVERCRACKX
Losing money to a crypto scam was one of the hardest lessons I’ve ever learned. I had invested my savings into a cryptocurrency trading platform that seemed trustworthy at first, great reviews, friendly support, and consistent profits showing on the dashboard. But everything changed the day I tried to withdraw my funds. My account got frozen, and within hours, the website vanished. Just like that, all my money was gone.The emotional pain was unbearable. I felt angry, ashamed, and completely hopeless. I couldn’t believe I had been deceived so easily. For weeks, I searched online for ways to recover my stolen cryptocurrency, but every forum post and “solution” seemed uncertain or full of false promises. Then, a close friend introduced me to Mbcoin Recovery Group, a professional cryptocurrency recovery company known for helping victims of crypto scams and fraudulent investments. I was skeptical at first, but after reading reviews and seeing their verified recovery cases, I decided to reach out.From the moment I contacted them, I knew I was dealing with experts. The team at Mbcoin Recovery Group explained every step clearly, from tracing blockchain transactions to working with crypto exchanges to identify the scammers’ wallets. Their communication was constant, transparent, and reassuring. After several weeks of investigation and tracking, Mbcoin Recovery Group successfully recovered a significant portion of my lost funds. I was shocked and deeply grateful. It felt like a miracle after months of despair.What makes Mbcoin Recovery Group truly stand out is their professionalism, honesty, and genuine care for victims of crypto fraud. They don’t promise miracles overnight, but they deliver real results with proven blockchain expertise.If you’ve lost money to crypto scams, don’t give up hope. Mbcoin Recovery Group can help you trace, recover, and secure your assets, just like they did for me. They turned my story of loss into one of recovery and renewed faith. Contact:
Email: Mbcoinrecoverygroup at aol. com
My losses in crypto investments though me the hard way, $60,000 worth of cryptocurrency lost within a blink of an eye to scammers. Seeing their advertisements online, their website looked legitimate with testimonies from investors of making successful withdrawals from the investment platform, I thought I had seen a once in a lifetime opportunity to make more money. I jumped at the opportunity thinking it was the right decision and ended up losing my hard earned funds, from the moment I couldn't make withdrawals on my request, on reaching out to the support group to verify the issue I got only silence from the investment platform. My advice to anyone who may have invested unwisely or is considering an uncertain investment is to consult recovery experts like c o r e a s s e t i n c RECOVERY FIRM before proceeding, they helped recover my lost investment funds something I never believed was possible again. The best way to contact them is through their email (COREASSETTINC @ GMAIL DOT COM) , SAVE YOURSELF BY CONSULTING THEM TODAY - THE WHOLE PROCESS IS WORTH IT.
Some comments may only be visible to logged-in visitors. Sign in to view all comments.