SniffleToKismet is a proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.
Clone the Sniffle fork:
git clone https://github.com/bkerler/Sniffle
Run the Sniffle receiver:
python3 Sniffle/python_cli/sniff_receiver.py -l -e -z --zmqhost 0.0.0.0 --zmqport 12345
This command configures the Sniffle dongle to look for Bluetooth 5 long range extended packets.
Start the SniffleToKismet proxy with the correct ZMQ details:
python3 sniffletokismet.py --zmq-host 0.0.0.0 --zmq-port 12345 --tcp-host 0.0.0.0 --tcp-port 9876
Start Kismet
kismet
Start the Kismet capture tool:
kismet_cap_antsdr_droneid --source antsdr-droneid:host=0.0.0.0,port=9876 --connect localhost:3501 --tcp
This project is licensed under the MIT License. See the LICENSE file for details.