<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NRF 802154 Thread / BT LE - capture packages without PCAP</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/91655/nrf-802154-thread-bt-le---capture-packages-without-pcap</link><description>Hi community, 
 For debugging / a project in very early stage I need to sniff Thread packages and (later on) Bluetooth (LE) and ZigBee packages. 
 I would like to use the kindly provided and good Python SDK but want to evaluate captured packages within</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 07 Sep 2022 14:51:40 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/91655/nrf-802154-thread-bt-le---capture-packages-without-pcap" /><item><title>RE: NRF 802154 Thread / BT LE - capture packages without PCAP</title><link>https://devzone.nordicsemi.com/thread/385076?ContentTypeID=1</link><pubDate>Wed, 07 Sep 2022 14:51:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:654c65bb-ff8d-40c6-8acf-e56cf5116207</guid><dc:creator>nrfmh</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Thanks!&lt;/p&gt;
&lt;p&gt;I will implement the Pyshark solution. As for future releases of the SDK it would be nice if there would be an option to handle packets captured within Python. I can imagine more customers have use for this &lt;span class="emoticon" data-url="https://devzone.nordicsemi.com/cfs-file/__key/system/emoji/1f642.svg" title="Slight smile"&gt;&amp;#x1f642;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Mart&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: NRF 802154 Thread / BT LE - capture packages without PCAP</title><link>https://devzone.nordicsemi.com/thread/384977?ContentTypeID=1</link><pubDate>Wed, 07 Sep 2022 09:43:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:731adeec-55e2-4986-85e1-fba8940d4ee6</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi&amp;nbsp;Mart,&lt;/p&gt;
&lt;p&gt;My mistake, you are correct that the documentation only explains how to use the script for pcap files.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We do not have anything ready to use for getting the sniffer log as something other than pcap, but you do have some options. One is to export the pcap file to a different file type in Wireshark by going to File &amp;gt; Export Packet Dissection, and then selecting file type. Another option is to&amp;nbsp;convert the pcap file in your Python script using tshark or similar. For this you can look into pyshark (&lt;a href="https://github.com/KimiNewt/pyshark/"&gt;https://github.com/KimiNewt/pyshark/&lt;/a&gt;), which is a Python wrapper for tshark. I would suggest trying to integrate&amp;nbsp;the nRF Sniffer Python module into your script as described in the documentation, and then after you stop the sniffer and is done capturing, you use pyshark to&amp;nbsp;process the pcap file.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: NRF 802154 Thread / BT LE - capture packages without PCAP</title><link>https://devzone.nordicsemi.com/thread/384844?ContentTypeID=1</link><pubDate>Tue, 06 Sep 2022 16:00:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5fe6bacf-6a82-4269-88d3-300288adc4ac</guid><dc:creator>nrfmh</dc:creator><description>&lt;p&gt;Hi Marte,&lt;/p&gt;
&lt;p&gt;Thanks for your reply. I have been looking in the documentation you refer to, but (if I understood right) this function can only start and stop sniffing, and when sniffing, it can only write to the PCAP given. So the packages it self can not be handled by the Python script for analysing/writing to a database.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Or am I wrong and this is possible but I am overseeing something?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Mart&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: NRF 802154 Thread / BT LE - capture packages without PCAP</title><link>https://devzone.nordicsemi.com/thread/384700?ContentTypeID=1</link><pubDate>Tue, 06 Sep 2022 06:44:57 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9cffa911-f7cf-489c-97f5-82a50eda6f07</guid><dc:creator>Marte Myrvold</dc:creator><description>&lt;p&gt;Hi&amp;nbsp;Mart,&lt;/p&gt;
&lt;p&gt;Yes, this is possible. Using the nRF Sniffer for 802.15.4 you can capture packets using a Python script by following the instructions here:&amp;nbsp;&lt;a href="https://infocenter.nordicsemi.com/topic/ug_sniffer_802154/UG/sniffer_802154/capturing_data_sniffer_802154_script.html"&gt;Capturing data using a script&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Marte&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>