<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Sniffing BLE 5.0 packets</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/26001/sniffing-ble-5-0-packets</link><description>Hi, 
 I am aware of how to use nRF51 sniffer with wireshark. 
 But in my current project, I am not able to sniff data packets. I am not sure which BLE stack is used in the product. whether it is BLE 4.2 or BLE 5.0. 
 I am able to capture advertising</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 13 Nov 2017 15:38:41 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/26001/sniffing-ble-5-0-packets" /><item><title>RE: Sniffing BLE 5.0 packets</title><link>https://devzone.nordicsemi.com/thread/102470?ContentTypeID=1</link><pubDate>Mon, 13 Nov 2017 15:38:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:947b9b28-e739-4b58-adba-a9aaaf6826d3</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;If you use our sniffer, you will only able to sniff BLE 4.0 . But it&amp;#39;s not a problem because from the trace we still can see what&amp;#39;s going on and can see if there is any feature of BLE 4.2 or 5.0 is requested (before the sniffer loses the connection).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing BLE 5.0 packets</title><link>https://devzone.nordicsemi.com/thread/102471?ContentTypeID=1</link><pubDate>Fri, 10 Nov 2017 15:38:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:46ee244e-6d82-40ce-bfe7-d8b93c25ebac</guid><dc:creator>Ankit</dc:creator><description>&lt;p&gt;I am able to capture logs for other devices which are BLE 4.2 supported. But I doubt that the device which I am not able to capture logs is supported by BLE 5.0.&lt;/p&gt;
&lt;p&gt;But still I will send you the trace file.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing BLE 5.0 packets</title><link>https://devzone.nordicsemi.com/thread/102469?ContentTypeID=1</link><pubDate>Fri, 10 Nov 2017 14:59:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0714bb33-5de0-428f-9f35-41b0e39ebce5</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Can you just upload the sniffer trace file, instead of the snapshot? You can send me via PM if there is anything confidential.&lt;/p&gt;
&lt;p&gt;From what I&amp;#39;m seeing, it seems more like the sniffer couldn&amp;#39;t capture all packets from the peers. You need to make sure you leave the sniffer close to both of the 2 devices (dozens of cm) Which board did you use as the sniffer ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing BLE 5.0 packets</title><link>https://devzone.nordicsemi.com/thread/102467?ContentTypeID=1</link><pubDate>Fri, 10 Nov 2017 11:46:48 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ee0a1e1f-ccf9-46ff-bda2-003555dea9ff</guid><dc:creator>Ankit</dc:creator><description>&lt;p&gt;Here I am attaching a snapshot of captured BLE packets.&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/pimgpsh_5F00_fullsize_5F00_distr.png"&gt;pimgpsh_fullsize_distr.png&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing BLE 5.0 packets</title><link>https://devzone.nordicsemi.com/thread/102468?ContentTypeID=1</link><pubDate>Tue, 17 Oct 2017 11:20:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f79046ea-db3c-4916-8e79-66d9416df71b</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Ankit,&lt;/p&gt;
&lt;p&gt;Beside connection request and empty PDUs, what else can you capture ?
Can you capture the Security encryption request ? Or PHY change request ? and Feature request ?&lt;/p&gt;
&lt;p&gt;The feature request and response will reveal if 4.2 is supported or not.&lt;/p&gt;
&lt;p&gt;Could you post a screenshot of a captured session ?&lt;/p&gt;
&lt;p&gt;The nRF51 sniffer should be able to BLE mesh packets, as long as the Mesh use the default advertising access address 0x8E89BED6. But it was not made to parse them and follow a communication (SAR packets for example)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>