Wireshark integration? #586
-
Currently I am using bumble to emulate embedded firmware and connect with other applications (Android, linux). I was wondering if its possible to sniff on the packets sent/recieved by bumble Controllers connected to the same My first hint is to use scapy to create a Wireshark sink. I also found this about the pcap structure for bluetooth https://www.tcpdump.org/linktypes/LINKTYPE_BLUETOOTH_LINUX_MONITOR.html. I think it would be an interesting application to sniff the HCI packets that are already available through the bumble controllers. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Android and Linux(BlueZ) have been supported by Wireshark. Doesn't that fit your use case? AFAIK, this kind of captures is based on extcat. There is a similar work for Thread: https://github.com/openthread/pyspinel/blob/main/extcap_ot.py |
Beta Was this translation helpful? Give feedback.
Bumble has support for pluggable HCI traffic sniffers. There's currently just one builtin sniffer, that knows how to save sniffed traffic to a snoop file (compatible with the Android HCI snoop files, which Wireshark knows how to read).
See the
Snooper
class, which is the base interface for snoopers. Snoopers can be added programmatically by using the API, or automatically based on a user-set environment variable. With env var, snoopers are created by thecreate_snooper
method, which will look at the "spec" and device which snooper should be instantiated.If you wanted something that supports live injection (as opposed to saving the snooped traffic to a file), you could either
1/ extend the
…