-
Notifications
You must be signed in to change notification settings - Fork 33
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
24 additions
and
17 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,44 +12,51 @@ Whsniff reads the packets from TI CC2531 USB dongle with [`sniffer_fw_cc2531` fi | |
##### Building | ||
|
||
* Install `libusb-1.0-0-dev`: | ||
|
||
$ sudo apt-get install libusb-1.0-0-dev | ||
|
||
```sh | ||
$ sudo apt-get install libusb-1.0-0-dev | ||
``` | ||
|
||
* Build release version: | ||
|
||
$ cd path/to/whsniff/Makefile | ||
$ make release | ||
```sh | ||
$ cd path/to/whsniff/Makefile | ||
$ make release | ||
``` | ||
|
||
|
||
##### How to use (Locally) | ||
|
||
* Connect CC2531 USB dongle to your Linux PC. | ||
|
||
* Open a terminal session on the desktop where you have Wireshark installed and enter the following commands: | ||
|
||
$ wireshark -k -i <( path/to/whsniff -c channel_number ) | ||
or | ||
$ path/to/whsniff -c 25 | wireshark -k -i - | ||
or | ||
$ mkfifo /tmp/pipes/whsniff | ||
$ path/to/whsniff -c 25 > /tmp/pipes/whsniff | ||
```sh | ||
$ wireshark -k -i <( path/to/whsniff -c channel_number ) | ||
or | ||
$ path/to/whsniff -c 25 | wireshark -k -i - | ||
or | ||
$ mkfifo /tmp/pipes/whsniff | ||
$ path/to/whsniff -c 25 > /tmp/pipes/whsniff | ||
``` | ||
|
||
* You can also save the output to a file to analyze it later using wireshark: | ||
$ path/to/whsniff -c 25 > filename.pcap | ||
```sh | ||
$ path/to/whsniff -c 25 > filename.pcap | ||
``` | ||
|
||
|
||
##### How to use (Remotely) | ||
|
||
* Connect CC2531 USB dongle to remote Linux PC or OpenWrt device, then start whsniff remotely with ssh from the desktop where you have Wireshark installed. | ||
|
||
* For Linux open a terminal session on the desktop and enter the following command: | ||
$ ssh [email protected] "whsniff -c 25" | wireshark -k -i - | ||
```sh | ||
$ ssh [email protected] "whsniff -c 25" | wireshark -k -i - | ||
``` | ||
where `192.168.1.202` is an IP address of the computer where dongle is connected. | ||
|
||
* For Windows install PuTTY with extension `plink.exe` from [PuTTY Download Page](http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html), then open a command prompt window and enter the following command: | ||
|
||
> "C:\Program Files\PuTTY\plink.exe" -ssh -pw password [email protected] whsniff -c 25 | "C:\Program Files\Wireshark\wireshark.exe" -k -i - | ||
```sh | ||
> "C:\Program Files\PuTTY\plink.exe" -ssh -pw password [email protected] whsniff -c 25 | "C:\Program Files\Wireshark\wireshark.exe" -k -i - | ||
``` | ||
where `password` is a root password and `192.168.1.202` is an IP address of the computer where dongle is connected. | ||
|
||
|
||
|