Sniffing BLE nDFU

i am performing DFU process b/w nrf54l15 and nrf connect mobile_app ( Android ) and i am sniffing the it using nrf54840 soc and the bord is nrf21540dk in Wireshark 

i know DFU process uses pairing for security, mtu exchange then firmware is divided into chunks and chunk is send to target device use the SMP Protocol + CBOR for actual packet transfer 

Target Device MAC_id : e3:4d:26:1c:52:c2

sniffing firmware = sniffer_nrf52840dk_nrf52840_4.1.1.hex 

DFU is working perfectely fine and it also updgrading Firmware of target device.


The ISSUE is the sniffer is not sniffing DFU process i also added the SC LTK in the wireshark 

[00:02:53.895,699] <inf> Lesson5_Exercise1: Passkey for 76:81:6B:E1:C7:F8 (random): 548220

[00:03:14.145,860] <inf> Lesson5_Exercise1: Security changed: 76:81:6B:E1:C7:F8 (random) level 4

[00:03:14.266,122] <inf> bt_keys: SC LTK: 0x40370a1753f59af41f0f267079363216


please find attachment for Wireshark-log and target device log

Related