<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>sniffing a laser tape</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/23842/sniffing-a-laser-tape</link><description>First time using the sniffer. 
 I want to sniff out the communication for a laser tape measuring device (Boosch GLM 50C) 
 
 I noticed that I am unable to sniff out anything when using with an android phone (is it because of a pairing operation?) I</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 28 Jul 2017 08:51:13 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/23842/sniffing-a-laser-tape" /><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93805?ContentTypeID=1</link><pubDate>Fri, 28 Jul 2017 08:51:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ca69e446-7c6a-4489-80d0-a4011062ea72</guid><dc:creator>erltot</dc:creator><description>&lt;p&gt;@rogerclark Nice, thanks for sharing!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93803?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 20:56:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fb3ff2d4-32be-4ebc-aa54-5afd57d17f71</guid><dc:creator>Roger Clark</dc:creator><description>&lt;p&gt;JADX is free and easy to use to decompile Android Apps.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/skylot/jadx"&gt;https://github.com/skylot/jadx&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93813?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 12:52:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:697ce612-9bf4-45d7-9342-62112e2e1222</guid><dc:creator>erltot</dc:creator><description>&lt;p&gt;Ok great so I should be able to figure this out :)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93804?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 12:44:16 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:24448173-7a48-44e9-96db-470bbaa48704</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;I always had better experience with nRF51 DK then dongle (dongle tend to overheat and also you cannot place it easily everywhere as it is typically plugged into laptop full of metal and electronics). There is one Q&amp;amp;A on this forum which provides unofficial port of sniffer FW for nRF52 DK but you have the system working so you might be fine for now.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93812?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 12:42:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:474f7f74-8909-4d92-9fac-ce1ec5bc0b87</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;Second sniffer log is perfectly fine except there are no real measurement data exchanges. But you now have working set-up, it seems that devices are not using any security (at least not at this point) as all GATT methods visible in the log are in clear. I assume that measurement protocol will run as Notify or Read methods over one of dedicated proprietary Characteristic Value handles. Unpair the device from phone (if paired), erase BT cache on the phone if possible and try to capture very first encounter of these two devices (e.g. restart both to be sure you start form clear situation). And try to capture actual data exchange (but the rest is on you, I don&amp;#39;t think you want us to reverse the protocol for you, do you?:)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93811?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 12:30:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7b3810fe-7045-442a-97f5-1a83fb5e18e9</guid><dc:creator>erltot</dc:creator><description>&lt;p&gt;I tried again with the phone, sniffer and laser much closer and now I got one called CONNECT_REQ, i&amp;#39;ll update question with the log. I see - I think disassembly java apps and sniffers for 20k USD are out of my scope at the moment :)&lt;/p&gt;
&lt;p&gt;I am using the nrf dongle (PCA10031), but i have a nrf52 devkit (PCA10040) nrf52832 available as well&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93810?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 12:21:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:58a0811f-24e7-4248-bf1d-14f7f677b5c2</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;From your sniffer log it&amp;#39;s obvious that it missed the connection (assuming there was some, gap in timing after packet #46 suggests that). What nRF51 board are you using? Do you have all phone, sniffer and Bosh thing close together during experiments? Note that Nordic sniffer has some limitations in sensitivity and that people who do such tasks for living are using specialized and much more expensive tools like Frontline or Ellysis analyzers (1-20k USD).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93809?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 12:15:16 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fc66d7c5-59a0-4819-bf2f-dd246b3a3fff</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;I guess Roger meant to disassemble Android app which is JAVA so it&amp;#39;s fairly possible, there are well known techniques and even they use obfuscation it&amp;#39;s usually possible to get through it - for decent hacker;)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93807?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 12:07:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c24f5ea5-80ea-439e-8144-7bed161022a3</guid><dc:creator>erltot</dc:creator><description>&lt;p&gt;@endnode
Updated the question with a wireshark log, i can&amp;#39;t see any connect req but i&amp;#39;ll try some more.
It is BLE protocol - I can connect with the nRF Connect (ios) app and read services and characteristics (unknown + device information)&lt;/p&gt;
&lt;p&gt;@Roger Clark
I&amp;#39;m not familiar with app programming at all, I know android has some bluetooth logging functionality avaiable in debug mode  - is this what you were thinking about?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93808?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 10:53:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b3a2dcee-2a97-4cbd-ac16-5e78fa75e40e</guid><dc:creator>Roger Clark</dc:creator><description>&lt;p&gt;An easier option is probably to reverse engineer the app&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: sniffing a laser tape</title><link>https://devzone.nordicsemi.com/thread/93806?ContentTypeID=1</link><pubDate>Thu, 27 Jul 2017 09:52:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7028355e-aa93-4f57-9879-787d6ae7c1dc</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;That&amp;#39;s hard to say based on your information. If you are sure that this device is using BLE protocol not classic BR/EDR and that you see the advertisement then it should be done. In the worst case you won&amp;#39;t be able to decode PDU payload if you don&amp;#39;t catch initial pairing&amp;amp;bonding procedure but if you have the chance then simply unbond the device in the phone and sniff that connection as well. If you don&amp;#39;t see CONNECT_REQ and subsequent connection link packets then most probably sniffer missed that and you should repeat the test or place sniffer differently to limit packet loss.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>