Skip to content

Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.

License

Notifications You must be signed in to change notification settings

alphafox02/SniffleToKismet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

SniffleToKismet

SniffleToKismet is a proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.

Features

  • Leverages the DroneID from DroneID GitHub.
  • Supports ZeroMQ (ZMQ) for data transmission.
  • Converts ZMQ messages to a format (mostly) compatible with Kismet's ANTSDR capture tool.
  • Provides some integration with Kismet for Bluetooth Remote ID drone detection and monitoring.

Requirements

  • Sniffle compatible dongle
  • Kismet
  • Python 3

Setup and Usage

  1. Clone the Sniffle fork:

    git clone https://github.com/bkerler/DroneID.git
    cd DroneID
    git submodule init
    git submoudule update
  2. Run the Sniffle receiver:

    python3 sniffle/python_cli/sniff_receiver.py -l -e -z -a --zmqsetting 127.0.0.1:4222

    This command configures the Sniffle dongle to look for Bluetooth 5 long range extended packets.

  3. Start the DroneID decoder in another terminal within the DroneID directory:

    python3 ./zmq_decoder.py -z --zmqsetting 127.0.0.1:4224 --zmqclients 127.0.0.1:4222
    
  4. Start the SniffleToKismet proxy with the correct ZMQ details:

    python3 sniffletokismet.py --zmq-host 0.0.0.0 --zmq-port 4224 --tcp-host 0.0.0.0 --tcp-port 9876
  5. Start Kismet

    kismet
  6. Start the Kismet capture tool:

    kismet_cap_antsdr_droneid --source antsdr-droneid:host=0.0.0.0,port=9876 --connect localhost:3501 --tcp

How It Works

  • The Sniffle compatible dongle captures Bluetooth 5 long range extended packets.
  • The captured packets are sent to the Sniffle receiver script which forwards them via ZeroMQ (ZMQ).
  • The SniffleToKismet proxy receives the ZMQ messages and translates them into a format compatible with Kismet's ANTSDR capture tool.
  • Kismet processes the data and provides enhanced drone detection and monitoring.

License

This project is licensed under the MIT License. See the LICENSE file for details.

About

Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This tool allows users to utilize a Sniffle compatible dongle to detect Bluetooth 5 long range extended packets and relay them to Kismet through a ZMQ to TCP proxy.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages