Get the latest tech news

Reverse Engineering and Dismantling Kekz Headphones


Close to a year ago, I stumbled upon the Kekz Headphones, which seemed like an interesting approach on the whole digital audio device space. They claimed to work without any internet connection and all of the content already on the headphones itself. I was intrigued, because there were some speculations going around, how they operate with those “Kekz”-Chips. I invite you to join me on a journey into the inner workings of those headphones. We will talk about accessing the encrypted files on the device, breaking the crypto and discovering disclosure of data from customers.

Close to a year ago, I stumbled upon the Kekz Headphones, which seemed like an interesting approach on the whole digital audio device space. The bit shifts cause significant information loss, and many different values could end up mapping to the same b5, b6, b7, b8 combination, leading to a large number of collisions. We can now encrypt, decrypt and brute force the cookie content, but you won’t get ny files onto or from the headset on your own, without opening up the headphones and accessing the SD Card.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Reverse Engineering

Reverse Engineering

Related news:

News photo

Reverse Engineering for Everyone

News photo

TempleOS Reverse Engineering

News photo

Silicon reverse engineering: The 8085's undocumented flags (2013)