-
Notifications
You must be signed in to change notification settings - Fork 94
Open
Description
Hi,
I am on MacOS (Intel). I installed the .uf2
code on the dongle without any problem. Also I installed the following on ~/.local/lib/wireshark/extcap
:
.
├── SnifferAPI
│ ├── CaptureFiles.py
│ ├── Devices.py
│ ├── Exceptions.py
│ ├── Filelock.py
│ ├── Logger.py
│ ├── Notifications.py
│ ├── Packet.py
│ ├── Pcap.py
│ ├── Sniffer.py
│ ├── SnifferCollector.py
│ ├── Types.py
│ ├── UART.py
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── CaptureFiles.cpython-313.pyc
│ │ ├── Devices.cpython-313.pyc
│ │ ├── Exceptions.cpython-313.pyc
│ │ ├── Filelock.cpython-313.pyc
│ │ ├── Logger.cpython-313.pyc
│ │ ├── Notifications.cpython-313.pyc
│ │ ├── Packet.cpython-313.pyc
│ │ ├── Pcap.cpython-313.pyc
│ │ ├── Sniffer.cpython-313.pyc
│ │ ├── SnifferCollector.cpython-313.pyc
│ │ ├── Types.cpython-313.pyc
│ │ ├── UART.cpython-313.pyc
│ │ ├── __init__.cpython-313.pyc
│ │ └── version.cpython-313.pyc
│ └── version.py
├── nrf_sniffer_ble.py
├── nrf_sniffer_ble.sh
└── requirements.txt
Here is the output of python3 ./nrf_sniffer_ble.py --extcap-interfaces
:
extcap {version=4.1.1}{display=nRF Sniffer for Bluetooth LE}{help=https://www.nordicsemi.com/Software-and-Tools/Development-Tools/nRF-Sniffer-for-Bluetooth-LE}
control {number=0}{type=selector}{display=Device}{tooltip=Device list}
control {number=1}{type=selector}{display=Key}{tooltip=}
control {number=2}{type=string}{display=Value}{tooltip=6 digit passkey or 16 or 32 bytes encryption key in hexadecimal starting with '0x', big endian format.If the entered key is shorter than 16 or 32 bytes, it will be zero-padded in front'}{validation=\b^(([0-9]{6})|(0x[0-9a-fA-F]{1,64})|([0-9A-Fa-f]{2}[:-]){5}([0-9A-Fa-f]{2}) (public|random))$\b}
control {number=3}{type=string}{display=Adv Hop}{default=37,38,39}{tooltip=Advertising channel hop sequence. Change the order in which the sniffer switches advertising channels. Valid channels are 37, 38 and 39 separated by comma.}{validation=^\s*((37|38|39)\s*,\s*){0,2}(37|38|39){1}\s*$}{required=true}
control {number=7}{type=button}{display=Clear}{tooltop=Clear or remove device from Device list}
control {number=4}{type=button}{role=help}{display=Help}{tooltip=Access user guide (launches browser)}
control {number=5}{type=button}{role=restore}{display=Defaults}{tooltip=Resets the user interface and clears the log file}
control {number=6}{type=button}{role=logger}{display=Log}{tooltip=Log per interface}
value {control=0}{value= }{display=All advertising devices}{default=true}
value {control=0}{value=[00,00,00,00,00,00,0]}{display=Follow IRK}
value {control=1}{value=0}{display=Legacy Passkey}{default=true}
value {control=1}{value=1}{display=Legacy OOB data}
value {control=1}{value=2}{display=Legacy LTK}
value {control=1}{value=3}{display=SC LTK}
value {control=1}{value=4}{display=SC Private Key}
value {control=1}{value=5}{display=IRK}
value {control=1}{value=6}{display=Add LE address}
value {control=1}{value=7}{display=Follow LE address}
Unfortunately, I cannot get Wireshark to detect the dongle. Here is the equivalent tshark
output:
tshark -D
1. en0 (Wi-Fi)
2. awdl0
3. llw0
4. utun0
5. utun1
6. utun2
7. utun3
8. utun4
9. utun5
10. lo0 (Loopback)
11. en2 (Thunderbolt 2)
12. en1 (Thunderbolt 1)
13. en4 (Thunderbolt 4)
14. en3 (Thunderbolt 3)
15. bridge0 (Thunderbolt Bridge)
16. gif0
17. stf0
18. ap1
19. ciscodump (Cisco remote capture)
20. randpkt (Random packet generator)
21. sshdump (SSH remote capture)
22. udpdump (UDP Listener remote capture)
23. wifidump (Wi-Fi remote capture)
Also, I tried explicitly setting it with this result:
Capturing on 'extcap:nrf_sniffer_ble.py'
tshark: There is no device named "extcap:nrf_sniffer_ble.py".
(No such device exists)
0 packets captured
Anyone have any idea what I'm doing wrong?
TIA,
-T
Metadata
Metadata
Assignees
Labels
No labels