<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Sniffing access addresses by matching on preamble nrf52</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/74125/sniffing-access-addresses-by-matching-on-preamble-nrf52</link><description>The BLEJack nrf51 sniffer firmware is a BLE sniffer/jammer/hijacker. If you google you will find the repo and the defcon presentation. 
 The author claims you can sniff access addresses by setting the radio to listen for an access address that matches</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 26 Apr 2021 06:15:31 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/74125/sniffing-access-addresses-by-matching-on-preamble-nrf52" /><item><title>RE: Sniffing access addresses by matching on preamble nrf52</title><link>https://devzone.nordicsemi.com/thread/306677?ContentTypeID=1</link><pubDate>Mon, 26 Apr 2021 06:15:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e43302b3-80c9-40c4-812e-e32d8753267a</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;No, I don&amp;#39;t think that&amp;#39;s possible. It needs to be known beforehand. For e.g. BLE advertising. all advertising packets use access address 0x&lt;span&gt;8e89bed6&lt;/span&gt;&amp;nbsp;i.e. you configure the access address you want to send/receive on beforehand.&amp;nbsp;&lt;span&gt;But maybe that sniffer is just scanning through all the access address possible for a BLE connection. i.e. access address number 1: wait x milliseconds for a match, then next address, wait x milliseconds for match,&amp;nbsp;then it goes through all address possible, looking for packets.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;-Amanda H.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing access addresses by matching on preamble nrf52</title><link>https://devzone.nordicsemi.com/thread/305586?ContentTypeID=1</link><pubDate>Mon, 19 Apr 2021 13:57:16 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ccf62582-71e4-4887-99d6-1ea2d59dbd05</guid><dc:creator>Bhamoss</dc:creator><description>&lt;p&gt;Hi Amanda,&lt;/p&gt;
&lt;p&gt;I am already working with the sniffer and even wrote my own uart driver for it as the firmware manages to have a huge byte loss rate over uart, which my driver tries to salvage and not discard the whole packet like your python API. It is not suitable for my problem for the following reason:&lt;/p&gt;
&lt;p&gt;The sniffer can simply listen for advertisements and than choose to follow a connection if it also receives the connection request intended for the victim. This request holds the access address and that is how the sniffer is able to capture packets of that connection. It extracts the info it needs to follow the connection from the connection request and any subsequent control procedures. I do not have that.&lt;/p&gt;
&lt;p&gt;As my initial question states &amp;quot;sniffing access addresses&amp;quot;, I really mean sniffing the access address, I do not have the access address. I want to listen on a channel and capture ANY packet from ANY connection and thus ANY access address. I hope this clarifies my 2 previous posts. I do not need the full packet, just the first 4 bytes after the preamble (the access address) which can be achieved by setting a static packet length and matching on the preamble of a packet.&lt;/p&gt;
&lt;p&gt;The repository I have been linking claims to have successfully achieved this on the Nrf51. It has more than 1000 stars and a defcon presentation was made, so I assume it works.&lt;/p&gt;
&lt;p&gt;Please, I understand I do not have any previous posts and it looks like a beginner question, but I have been researching this chip and the lower layers of the BLE protocol for months. Judging by your answers I feel you do not grasp the depth of my question.&lt;/p&gt;
&lt;p&gt;Again, my question is, can some hardware engineer who knows about the radio circuitry over at Nordic confirm this would be possible for the Nrf51 (as has been shown in the BTLEJack work).&lt;/p&gt;
&lt;p&gt;Secondly, can they confirm whether it is or it is not possible on the Nrf52(840) in the same way? I have been working on that and trying many variations without success, leading me to believe something in the closed source hardware might have changed rendering this approach useless for this generation (nrf52). If not and thus it is possible in the same way as the Nrf51, I know I am at fault.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing access addresses by matching on preamble nrf52</title><link>https://devzone.nordicsemi.com/thread/305568?ContentTypeID=1</link><pubDate>Mon, 19 Apr 2021 13:34:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1b11f0a2-ec18-4bee-b175-961d5bebc4f1</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Sorry for misunderstanding your question.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You could check out&amp;nbsp;&lt;a title="nRF Sniffer for Bluetooth LE" href="https://infocenter.nordicsemi.com/topic/ug_sniffer_ble/UG/sniffer_ble/intro.html?cp=9_4"&gt;nRF Sniffer for Bluetooth LE&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;-Amanda H.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing access addresses by matching on preamble nrf52</title><link>https://devzone.nordicsemi.com/thread/305550?ContentTypeID=1</link><pubDate>Mon, 19 Apr 2021 13:01:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:54cc1488-a368-47ef-95f7-c1ab2f52faa3</guid><dc:creator>Bhamoss</dc:creator><description>&lt;p&gt;Hi Amanda,&lt;/p&gt;
&lt;p&gt;I do not think you understand my question. I know very well how to operate the radio directly. My question is much deeper than that.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/virtualabs/btlejack"&gt;https://github.com/virtualabs/btlejack&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This repository and its DefCon presentation claim you can use the radio (directly) by configuring the radio to listen for the preamble of a packet as access address (BASE0 and PREFIX0 = 0xAA or 0x55 with BALEN 0 or 1) so that the radio wakes up and captures because the preamble of any BLE4 packet will match this. If you set STATLEN=MAXLEN=10 and s0,len,s1 length = 0, after the end event, the bits off the access address should be in the receive buffer (possibly misaligned) as they are the next 4 octets after the preamble is sent.&lt;/p&gt;
&lt;p&gt;Having elaborated on this, could you please reread my initial question in this light and provide me with an answer?&lt;/p&gt;
&lt;p&gt;Thank you very much&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Sniffing access addresses by matching on preamble nrf52</title><link>https://devzone.nordicsemi.com/thread/305505?ContentTypeID=1</link><pubDate>Mon, 19 Apr 2021 11:45:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c03de56c-3695-4c7e-a05d-760db46a00a3</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;You can find the address&amp;nbsp;configuration for the RADIO here:&lt;/span&gt;&lt;br /&gt;&lt;a href="https://infocenter.nordicsemi.com/topic/com.nordic.infocenter.nrf52832.ps.v1.1/radio.html?cp=2_1_0_22_3#concept_mdy_kcj_4r"&gt;https://infocenter.nordicsemi.com/topic/com.nordic.infocenter.nrf52832.ps.v1.1/radio.html?cp=2_1_0_22_3#concept_mdy_kcj_4r&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;We have an example of a&amp;nbsp;&lt;/span&gt;&lt;a href="https://github.com/NordicPlayground/nRF51-multi-role-conn-observer-advertiser"&gt;BLE scanner&lt;/a&gt;&lt;span&gt;&amp;nbsp;using the radio directly. You can have a look at the&amp;nbsp;&lt;/span&gt;&lt;a href="https://github.com/NordicPlayground/nRF51-multi-role-conn-observer-advertiser/blob/master/btle_hci/scanner/radio.c#L75"&gt;radio_init() function&lt;/a&gt;&lt;span&gt;&amp;nbsp;to have an idea how to configure the radio to receive BLE packet. In this case the address is 0x8E89BED6, you can modify to match with the address needed in the test.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-Amanda H.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>