This repository contains firmware and Wireshark extcap script that can be used with nRF52840 chip as an 802.15.4 sniffer.
Note: this project is experimental.
The software provided has been tested with the nRF52840-DK board and the following operating systems:
- Ubuntu 18.04 (Wireshark 2.4.5 from the official package, Wireshark 2.6.4)
- Windows 10 (Wireshark 2.6.3)
- macOS Mojave (Wireshark 2.6.4)
- Wireshark (Ubuntu package
wireshark
) - pySerial (Ubuntu package
python-serial
orpython3-serial
)
To start using the sniffer, you must flash the firmware, install the script, and configure the sniffer in Wireshark.
- Connect the nRF52840-DK to the PC with an USB cable by connecting it to the J2 USB port.
- Flash the firmware with the following command:
nrfjprog -f nrf52 --program nrf802154_sniffer/nrf802154_sniffer.hex --chiperase -r
- J2 USB port can now be optionally disconnected.
- Connect the nRF52840-DK to J3 nRF USB port.
Note: Sniffer firmware can no longer transport captured packets over J2 USB port. Capture can be carried out using only the J3 nRF USB port.
- Download and install nRF Connect for Desktop.
- Click
Add/remove apps
and installProgrammer
application. - Plug the dongle to USB port and click reset button to enter DFU mode. Red diode should start blinking.
- Select
Nordic Semiconductor DFU Bootloader
device from the list. - Click
Add HEX file
and selectnrf802154_sniffer_dongle.hex
fromnrf802154_sniffer
directory. - Verify that the selected application begins at the
0x00001000
address to avoid overwriting the MBR section. - Click
Write
to flash the device. - Unplug the dongle from the USB port and plug it again. Do not click the reset button.
To find the correct installation path of the extcap utility on any system please see:
"Help" -> "About Wireshark" -> "Folders" -> "Extcap path"
Copy the provided nrf802154_sniffer.py
script to the extcap directory.
Note to Windows users: nrf802154_sniffer.bat
has to be copied to the same directory as well.
Ensure that Python directory is included in your PATH
system environment variable.
- Run Wireshark.
- Click the gear icon next to the 'nRF 802.15.4 sniffer'.
- Select the 802.15.4 channel.
- Select the format for out-of-band meta-data.
- Click 'Start'.
In order to decode packets exchanged on the Thread network it is necessary to configure the Wireshark to use correct decryption keys.
To set decryption keys go to Edit -> Preferences... -> Protocols -> IEEE 802.15.4 -> Decryption Keys
. The default decryption key used by nRF5 SDK for Thread and Zigbee examples is 00112233445566778899aabbccddeeff
. Set decryption key index to 0
and Key hash
to Thread hash
value.
Thread uses CoAP protocol on port 61631 for internal purposes. To correctly decode packets sent over that port you can either:
- apply the setting globally by editing CoAP protocol settings in
Preferences
and changing theCoAP UDP port
value to61631
. - apply it on per-capture basis by adding an entry to
Analyze -> Decode as...
. SetField
column toUDP port
,Value
to61631
and decode using CoAP dissector (Current
column).
Go to 6loWPAN settings in Preferences
window and add correct values. Contexts may vary depending on the Thread Network Data. Below values are used by Thread examples in nRF5 SDK.
- Context 0:
fdde:ad00:beef:0::/64
- Context 1:
fd11:22::/64
If Wireshark uses incorrect dissectors to decode a message you have an option to disable unwanted protocols. Go to Analyze -> Enabled protocols
and uncheck unwanted protocols. Suggestions below.
- LwMesh
- ZigBee
- ZigBee Green Power
To capture the data for Zigbee examples in SDK, you must manually configure Wireshark:
- Press Ctrl + Shift + P to enter the Wireshark preferences.
- Go to
Protocols -> Zigbee
. - Click the
Edit
button next to Pre-configured Keys. The Pre-configured Keys window appears. - Add two entries by clicking on the "+" button:
- Key:
5A:69:67:42:65:65:41:6C:6C:69:61:6E:63:65:30:39
, Byte Order: Normal, Label: ZigbeeAlliance09 - Key:
ab:cd:ef:01:23:45:67:89:00:00:00:00:00:00:00:00
, Byte Order: Normal, Label: Nordic Examples
- Key:
The sniffer can provide additional information such as channel, RSSI and LQI for every packet. The format used for this is configurable in the Interface Options dialog (the gear icon next to the 'nRF 802.15.4 sniffer'). Depending on the Wireshark version this can be configured in two ways:
- For Wireshark 3.0 and later: Select "IEEE 802.15.4 TAP".
- For Wireshark 2.4 and 2.6: Install a custom Lua dissector and select "Custom Lua dissector".
Copy the provided script to the appropriate directory (it can be found in About Wireshark -> Folders -> Personal Lua Plugins
):
sudo cp nrf802154_sniffer/nrf802154_sniffer.lua /usr/lib/x86_64-linux-gnu/wireshark/plugins/