<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Decrypting BLE traffic from sniffer with CLI captured data</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/122798/decrypting-ble-traffic-from-sniffer-with-cli-captured-data</link><description>I&amp;#39;m trying to use &amp;#39;nrfutil ble-sniffer sniff --follow &amp;quot;${target} public&amp;quot; --port ${device} --output-pcap-file ${output} --coded --timeout 5000 --log-level info --log-output stdout --json&amp;#39; in a script to split up automated testing captures, where target</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 09 Oct 2025 21:53:06 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/122798/decrypting-ble-traffic-from-sniffer-with-cli-captured-data" /><item><title>RE: Decrypting BLE traffic from sniffer with CLI captured data</title><link>https://devzone.nordicsemi.com/thread/551046?ContentTypeID=1</link><pubDate>Thu, 09 Oct 2025 21:53:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f35c7787-6ca7-49bb-96ca-d903f47a26b4</guid><dc:creator>JonathanCrockett</dc:creator><description>&lt;p&gt;Can I get an update from your wireshark people on if there is a way to accomplish this? I&amp;#39;d like to be able to capture and decode snippets of BLE conversations.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Decrypting BLE traffic from sniffer with CLI captured data</title><link>https://devzone.nordicsemi.com/thread/541869?ContentTypeID=1</link><pubDate>Wed, 09 Jul 2025 06:59:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:327084b5-bb94-4418-924a-73ea9bf6c9af</guid><dc:creator>Susheel Nuguru</dc:creator><description>&lt;p&gt;I am not an expert in this but it seems like when you run that command, it just spits raw Link-Layer frames into your PCAP. Once the BLE link goes encrypted, you’re looking at ciphertext—there’s no built-in hook for &lt;code&gt;nrfutil&lt;/code&gt; to drop in your Long Term Key (LTK). That’s why nothing you do afterward in Wireshark seems to stick. The people with wireshark expertise are away on summer vacation and unfortunately we need to wait until they come back after two weeks to be able get their insights and see if there is any other way to do this.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>