2015-09-10 00:10:12 +02:00
|
|
|
About
|
|
|
|
=====
|
|
|
|
|
2019-12-24 15:31:41 +01:00
|
|
|
This application is built to run together with the script `./tools/sniffer.py`
|
|
|
|
as a sniffer for (wireless) data traffic. This application works with any board
|
|
|
|
with any network device that supports the gnrc network stack (or precisely the
|
|
|
|
gnrc parts up to the link-layer). Further the network device (and its driver)
|
|
|
|
needs to support promiscuous and raw mode for usable output. Finally the board
|
|
|
|
needs to include auto-initialization code for the targeted network device.
|
2015-09-10 00:10:12 +02:00
|
|
|
|
|
|
|
|
|
|
|
Usage
|
|
|
|
=====
|
|
|
|
|
2019-12-24 15:31:41 +01:00
|
|
|
Compile and flash this application to the board of your choice. You can check
|
|
|
|
if everything on the RIOT side works by connecting to the board via UART and by
|
2019-12-24 15:33:53 +01:00
|
|
|
checking with `ifconfig` if a network device is available. Also note the
|
|
|
|
interface number for the following commands. Then you can check with
|
|
|
|
`ifconfig <iface> promisc` if promiscuous mode is supported and with
|
|
|
|
`ifconfig <iface> raw` if raw mode is supported by the driver/network device.
|
2015-09-10 00:10:12 +02:00
|
|
|
|
2019-12-24 17:14:52 +01:00
|
|
|
For further information on setting up the host part, see `./tools/README.md`.
|