This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

BLE 4.2 sniffer

I am hoping to get solid verification that nordic offers a solution for sniffing BLE 4.2 packets.

The application I need to sniff is maxing out the MTU (250B payload) so I need support for long packets.

The blogs and googling haven't provided me with a solid answer.

Thanks

Parents
  • I'm in the very same situation. I have MTU sizes > 200 bytes and I'm blind to what happens over the air. In addition, I have the problem, that I'm using a Mac to work with. If I got the NRF Sniffer architecture right: There is a firmware on an evaluation board, sending the received data via a serial connection, which is then reformated by some python scripts, which send sends the data to wireshark for interpretation.

    I would be happy to help to port the windows-only part to OS/X and to help to improve the eval board firmware, if Nordic want's to release this as open source.

    I mean, yes, I could write a firmware for an eval board that does the same and write an adapter for wireshark, but this would likely take me some weeks and the NRF Sniffer is already there.

  • yeah - is there a bug report I missed? I've not seen anyone post a question for a year I think. Given that Nordic continues to recommend an older version of wireshark I had no idea anyone was using a newer one. I tend to dump the stuff to pcap files with the code and then look at it in wireshark afterwards anyway, never really found the 'live view' that useful (and it got broken by one of the wireshark updates a couple of years back but I think that's long fixed by now).

Reply
  • yeah - is there a bug report I missed? I've not seen anyone post a question for a year I think. Given that Nordic continues to recommend an older version of wireshark I had no idea anyone was using a newer one. I tend to dump the stuff to pcap files with the code and then look at it in wireshark afterwards anyway, never really found the 'live view' that useful (and it got broken by one of the wireshark updates a couple of years back but I think that's long fixed by now).

Children
No Data
Related