Skip to content

Instantly share code, notes, and snippets.

@TasyDevilsky
Last active May 30, 2024 13:25
Show Gist options
  • Save TasyDevilsky/0625c2eea27b1d237f828b68bf0b0742 to your computer and use it in GitHub Desktop.
Save TasyDevilsky/0625c2eea27b1d237f828b68bf0b0742 to your computer and use it in GitHub Desktop.
This is tutorial how to sniff BLE devices using Kismet and NRF51822 Adafruit LE Friend

Kismet and NRF51822

It doesn't matter, if you bought Le Friend with sniffer firmware or just for debug. image

Prerequisites

Flash NRF51822 into sniffer

  1. Download zip file V.2.X.X You can also use latest FW called sniffer_nrf51dk_nrf51422_4.1.1.hex because this chip is quite similar to nrf51822 Source
  2. get hex file sniffer_pca10028_c87e17d.hex from /hex/ directory. rename it to fw.hex
  3. download bootloader from HERE especially bootloader_0002.hex and rename it to bootloader.hex
  4. Flash it using openocd
  5. Download latest Wireshark plugin HERE V.4.X.X
  6. Use this GUIDE to install plugin into wireshark

Don't know why, but probably you need run wireshark as sudo - remember that when you run wireshark as sudo you will have different Personal extcap!!

openocd flashing

erase current firmware

openocd -f interface/stlink.cfg \
-f target/nrf51.cfg \
-c  init \
-c "reset init" \
-c halt \
-c "nrf51 mass_erase" \
-c exit

disconnect ST-LINK and connect it again before upload new sniffer firmware!

upload new sniffer firmware

openocd \
-f interface/stlink.cfg \
-f target/nrf51.cfg \
-c  init \
-c "reset init" \
-c halt \
-c "flash write_image bootloader.hex 0 ihex" \
-c "flash write_image fw.hex 0 ihex" \
-c "reset run" \
-c exit

Now you should be able to use this device with Kismet.

Thanks

Thanks for this GUIDE It helped me a lot, but it doesn't work correctly with my wireshark 4.2.5 and also with kismet too.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment