This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

nRF Sniffer integration for 802.15.4 in a python scipt (Pcap file problems)

I have developed a python script to sniff the OpenThread network using the Nrf802154Sniffer() library, which generates a pcap file.

 I used it with the nRF Sniffer hardware (nRF52840 DK and nRF52840 Dongle).


The problem is that in the pcap file generated, I found that there are packets that are not well analyzed, but in Wireshark it sniffs packets well.

Do you have any idea where this problem comes from.

thank you in advance

Best regards,

Ayoub GH

Parents Reply
  • In Pcap_Failed you are missing a 802.15.4 Broadcast packet with full source address to be able to recreate the "Extended Address" (needed for decryption) on packets without full source address. You can see this in "Source Address Mode" Long vs. Short in the 802.15.4 Frame Control Field, and the following "No extended source address - can't decrypt" warning from Wireshark. In working packets you will find a "Origin" field with a reference to this Broadcast packet.

    In Pcap_Passed you have several of this packets in the beginning.

    In the attached Pcap_Failed_Fixed I have manually copied packet 6 to the beginning of the file, and then the decryption should work.

    Pcap_Failed_Fixed.pcap

Children
Related