alphafox02 / SniffleToKismet

Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.
MIT License
13 stars 2 forks source link

SniffleToKismet

SniffleToKismet is a proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.

Features

Requirements

Setup and Usage

  1. Clone the Sniffle fork:

    git clone https://github.com/bkerler/Sniffle
  2. Run the Sniffle receiver:

    python3 Sniffle/python_cli/sniff_receiver.py -l -e -z --zmqhost 0.0.0.0 --zmqport 12345

    This command configures the Sniffle dongle to look for Bluetooth 5 long range extended packets.

  3. Start the SniffleToKismet proxy with the correct ZMQ details:

    python3 sniffletokismet.py --zmq-host 0.0.0.0 --zmq-port 12345 --tcp-host 0.0.0.0 --tcp-port 9876
  4. Start Kismet

    kismet
  5. Start the Kismet capture tool:

    kismet_cap_antsdr_droneid --source antsdr-droneid:host=0.0.0.0,port=9876 --connect localhost:3501 --tcp

How It Works

License

This project is licensed under the MIT License. See the LICENSE file for details.