1
0
mirror of https://github.com/RIOT-OS/RIOT.git synced 2024-12-29 04:50:03 +01:00
RIOT/dist/tools/sniffer/README.md

58 lines
1.5 KiB
Markdown
Raw Normal View History

Using Wireshark to sniff 802.15.4/Zigbee/6lowpan traffic:
=========================================================
Software
--------
In order to sniff any radio packets use the sniffer application from the in the
RIOT applications repository (https://github.com/RIOT-OS/applications/).
Generating a .pcap
------------------
The next step is to run the control python script, rftestrx2pcap.py,
(part of RIOT). This script will set the channel on the node and then create a
.pcap with the packets received. The script is a modified version of [malvira's
script](https://github.com/malvira/libmc1322x/blob/master/tools/rftestrx2pcap.py)
for the Redbee Ecotag (https://github.com/malvira/libmc1322x/wiki/wireshark).
### Download rftestrx2pcap.py
[rftestrx2pcap.py](rftestrx2pcap.py)
### Install dependencies
Needs [pyserial](https://pypi.python.org/pypi/pyserial)
#### Debuntu
apt-get install python-serial
#### PIP
pip install pyserial
### Usage
./rftestrx2pcap.py tty chan [outfile]
rftestrx2pcap.py takes the tty/com port as the first argument and the radio
channel as the second (from 0 through 24). The third argument is an optional
output file.
#### Linux
Dump packets to a file:
$ ./rftestrx2pcap.py /dev/ttyUSB1 10 > foo.pcap
This .pcap can then be opened in wireshark.Alternatively for live
captures, you can pipe directly into wireshark with:
$ ./rftestrx2pcap.py /dev/ttyUSB1 10 | wireshark -k -i -
#### Windows
For windows you can use the optional third argument to output to a
.pcap:
$ ./rftestrx2pcap.py /dev/ttyUSB1 26 foo.pcap