Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dongle Not Working On MacOS #112

Open
gamename opened this issue Jan 29, 2025 · 0 comments
Open

Dongle Not Working On MacOS #112

gamename opened this issue Jan 29, 2025 · 0 comments

Comments

@gamename
Copy link

Hi,

I am on MacOS (Intel). I installed the .uf2 code on the dongle without any problem. Also I installed the following on ~/.local/lib/wireshark/extcap:

.
├── SnifferAPI
│   ├── CaptureFiles.py
│   ├── Devices.py
│   ├── Exceptions.py
│   ├── Filelock.py
│   ├── Logger.py
│   ├── Notifications.py
│   ├── Packet.py
│   ├── Pcap.py
│   ├── Sniffer.py
│   ├── SnifferCollector.py
│   ├── Types.py
│   ├── UART.py
│   ├── __init__.py
│   ├── __pycache__
│   │   ├── CaptureFiles.cpython-313.pyc
│   │   ├── Devices.cpython-313.pyc
│   │   ├── Exceptions.cpython-313.pyc
│   │   ├── Filelock.cpython-313.pyc
│   │   ├── Logger.cpython-313.pyc
│   │   ├── Notifications.cpython-313.pyc
│   │   ├── Packet.cpython-313.pyc
│   │   ├── Pcap.cpython-313.pyc
│   │   ├── Sniffer.cpython-313.pyc
│   │   ├── SnifferCollector.cpython-313.pyc
│   │   ├── Types.cpython-313.pyc
│   │   ├── UART.cpython-313.pyc
│   │   ├── __init__.cpython-313.pyc
│   │   └── version.cpython-313.pyc
│   └── version.py
├── nrf_sniffer_ble.py
├── nrf_sniffer_ble.sh
└── requirements.txt

Here is the output of python3 ./nrf_sniffer_ble.py --extcap-interfaces:

extcap {version=4.1.1}{display=nRF Sniffer for Bluetooth LE}{help=https://www.nordicsemi.com/Software-and-Tools/Development-Tools/nRF-Sniffer-for-Bluetooth-LE}
control {number=0}{type=selector}{display=Device}{tooltip=Device list}
control {number=1}{type=selector}{display=Key}{tooltip=}
control {number=2}{type=string}{display=Value}{tooltip=6 digit passkey or 16 or 32 bytes encryption key in hexadecimal starting with '0x', big endian format.If the entered key is shorter than 16 or 32 bytes, it will be zero-padded in front'}{validation=\b^(([0-9]{6})|(0x[0-9a-fA-F]{1,64})|([0-9A-Fa-f]{2}[:-]){5}([0-9A-Fa-f]{2}) (public|random))$\b}
control {number=3}{type=string}{display=Adv Hop}{default=37,38,39}{tooltip=Advertising channel hop sequence. Change the order in which the sniffer switches advertising channels. Valid channels are 37, 38 and 39 separated by comma.}{validation=^\s*((37|38|39)\s*,\s*){0,2}(37|38|39){1}\s*$}{required=true}
control {number=7}{type=button}{display=Clear}{tooltop=Clear or remove device from Device list}
control {number=4}{type=button}{role=help}{display=Help}{tooltip=Access user guide (launches browser)}
control {number=5}{type=button}{role=restore}{display=Defaults}{tooltip=Resets the user interface and clears the log file}
control {number=6}{type=button}{role=logger}{display=Log}{tooltip=Log per interface}
value {control=0}{value= }{display=All advertising devices}{default=true}
value {control=0}{value=[00,00,00,00,00,00,0]}{display=Follow IRK}
value {control=1}{value=0}{display=Legacy Passkey}{default=true}
value {control=1}{value=1}{display=Legacy OOB data}
value {control=1}{value=2}{display=Legacy LTK}
value {control=1}{value=3}{display=SC LTK}
value {control=1}{value=4}{display=SC Private Key}
value {control=1}{value=5}{display=IRK}
value {control=1}{value=6}{display=Add LE address}
value {control=1}{value=7}{display=Follow LE address}

Unfortunately, I cannot get Wireshark to detect the dongle. Here is the equivalent tshark output:

tshark -D
1. en0 (Wi-Fi)
2. awdl0
3. llw0
4. utun0
5. utun1
6. utun2
7. utun3
8. utun4
9. utun5
10. lo0 (Loopback)
11. en2 (Thunderbolt 2)
12. en1 (Thunderbolt 1)
13. en4 (Thunderbolt 4)
14. en3 (Thunderbolt 3)
15. bridge0 (Thunderbolt Bridge)
16. gif0
17. stf0
18. ap1
19. ciscodump (Cisco remote capture)
20. randpkt (Random packet generator)
21. sshdump (SSH remote capture)
22. udpdump (UDP Listener remote capture)
23. wifidump (Wi-Fi remote capture)

Also, I tried explicitly setting it with this result:

Capturing on 'extcap:nrf_sniffer_ble.py'
tshark: There is no device named "extcap:nrf_sniffer_ble.py".
(No such device exists)
0 packets captured

Anyone have any idea what I'm doing wrong?

TIA,
-T

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant