Skip to content

Instantly share code, notes, and snippets.

@jacobrosenthal
Last active March 8, 2017 00:34
Show Gist options
  • Save jacobrosenthal/6f36eea3653bacaeae23152cb4941c48 to your computer and use it in GitHub Desktop.
Save jacobrosenthal/6f36eea3653bacaeae23152cb4941c48 to your computer and use it in GitHub Desktop.
nrf51 packet sniffer wireshark pipe usage
https://www.nordicsemi.com/eng/Products/Bluetooth-low-energy/nRF-Sniffer
unpacks
Sniffer/Firmware/ble-sniffer_nRF51822_1.0.1_1111_Sniffer.hex
• JLinkExe -if SWD -device nrf51
• w4 0x4001e504, 0x2
• w4 0x4001e50c, 0x1
• loadbin ble-sniffer_nRF51822_1.0.1_1111_Sniffer.hex, 0
• r
• g
git clone [email protected]:jacobrosenthal/Adafruit_BLESniffer_Python.git
cd Adafruit_BLESniffer_Python
python sniffer.py /dev/tty.usbmodem1411 -p
Jacobs-MacBook-Air:Adafruit_BLESniffer_Python jacobrosenthal$ python sniffer.py /dev/tty.usbmodem1411 -p
Capturing data to logs/capture.pcap
Connecting to sniffer on /dev/tty.usbmodem1411
Scanning for BLE devices (5s) ...
Found 8 BLE devices:
[1] "" (00:22:D0:2A:E4:A3, RSSI = -64)
[2] "" (33:B2:5F:DA:48:D6, RSSI = -103)
[3] "" (B0:03:4B:F1:75:F3, RSSI = -50)
[4] "" (D0:03:4B:45:EC:F1, RSSI = -103)
[5] "" (D0:03:4B:31:75:F2, RSSI = -103)
[6] "" (0B:F2:C4:87:78:2C, RSSI = -103)
[7] "" (F8:B2:3F:43:6E:F3, RSSI = -100)
[8] "oura_0_E32000D86085" (E3:20:00:D8:60:85, RSSI = -84)
Select a device to sniff, or '0' to scan again
> 1
Attempting to follow device 00:22:D0:2A:E4:A3
Pipe ready, run: wireshark -Y btle -k -i /Users/jacobrosenthal/Downloads/Adafruit_BLESniffer_Python/logs/ble.pipe
connected: False, packets: 2695, missed: 0
If you started wireshark you're getting avdvertising packets in. Now youll want to probably sniff some other device connecting to the device you're sniffing. Kick off that connection, and watch for connected: False to turn to connected: True
Catching a connect can take many attempts, keep trying.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment