+ #print ".";
+ printmspacket(packet);
+ sys.stdout.flush();
+
+if(sys.argv[1]=="sniffant"):
+ #Prototyped on Garmin device.
+ #Channel hopping is pretty damned fast, hard to follow.
+ #This doesn't really work yet, still experimenting.
+
+ #Might be more effective to sniff knowing the MFG ID and Dev. ID,
+ #as these predict a lot of the MAC address.
+
+ client.poke(0x00,0x00); #Stop nRF
+ client.poke(0x01,0x00); #Disable Shockburst
+ client.poke(0x02,0x01); #Set RX Pipe 0
+
+ client.poke(0x05,57); #broadcast-only channel
+ client.poke(0x06,0x00); #1MBps
+ client.poke(0x07,0x78); #Reset status register
+
+ #Is this appropriate? Might be 3.
+ client.RF_setmaclen(5);
+
+
+ #Mac packet length, illegally 0-length address field.
+ client.RF_setpacketlen(16);
+
+ if len(sys.argv)>2:
+ client.tune(sys.argv[2]);
+ else:
+
+ print "Searching for ANT+.";
+
+ guesser=AutoTuner();
+ guesser.init(client, rate=False, sync=True, chan=True);
+ guesser.selftune(threshold=2,forever=False,
+ delay=9.0);
+
+ client.poke(0x00,0x00); #Stop nRF
+ client.poke(0x01,0x00); #Disable Shockburst
+ client.poke(0x02,0x01); #Set RX Pipe 0
+ client.RF_setmaclen(5);
+
+
+ client.poke(0x00,0x70|0x03); #prime radio.
+ print "Dumping ANT as %010x on %i MHz" % (client.RF_getsmac(),
+ client.RF_getfreq()/10**6);
+ #Now we're ready to get packets.
+ while 1:
+ packet=None;
+ while packet==None:
+ #time.sleep(1);
+ packet=client.RF_rxpacket();
+ #print ".";
+ printpacket(packet);
+ sys.stdout.flush();
+
+
+
+
+if(sys.argv[1]=="sniffsf"):
+ #Reversal of transmitter code from nRF_CMD.c of OpenBeacon
+ #TODO remove all poke() calls.
+
+ client.poke(0x00,0x00); #Stop nRF
+ client.poke(0x01,0x00); #Disable Shockburst
+ client.poke(0x02,0x01); #Set RX Pipe 0
+
+ client.RF_setfreq(2402 * 10**6);
+ client.poke(0x06,0x07); #1Mbps
+ client.poke(0x07,0x78); #Reset status register
+
+ #OpenBeacon defines these in little endian as follows.
+ client.RF_setmaclen(5); # SETUP_AW for 5-byte addresses.
+ client.RF_setsmac(0xe7e7e7e7e7);
+ client.RF_settmac(0xe7e7e7e7e7);
+
+ #Set packet length of 16.
+ client.RF_setpacketlen(4);
+
+ #Power radio, prime for RX, one-byte checksum.
+ client.poke(0x00,0x70|0x03|0x08); #0x08 for one byte, 0x04 for two.
+
+ print "Listening as %010x on %i MHz" % (client.RF_getsmac(),
+ client.RF_getfreq()/10**6);
+ #Now we're ready to get packets.
+ while 1:
+ packet=None;
+ while packet==None:
+ #time.sleep(0.1);
+ packet=client.RF_rxpacket();
+ printpacket(packet);
+ sys.stdout.flush();
+
+if(sys.argv[1]=="sniffnike"):
+ #TODO remove all poke() calls.
+
+ client.poke(0x00,0x00); #Stop nRF
+ client.poke(0x01,0x00); #Disable Shockburst
+ client.poke(0x02,0x01); #Set RX Pipe 0
+
+ client.RF_setfreq(2425 * 10**6);
+ client.poke(0x06,0x20|0x06); #250 kbps
+ client.poke(0x07,0x78); #Reset status register
+
+ #Nike Settings
+ client.RF_setmaclen(2); # Illegal by datasheet, but it works!
+ client.RF_setsmac(0xc2bd);
+ client.RF_settmac(0xc2bd); #Should we forge data?
+
+ client.RF_setpacketlen(32); #No idea what the length is.
+
+ #Power radio, prime for RX, two-byte checksum.
+ client.poke(0x00,0x70|0x03); #0x08 for checksum, 0x04 for two bytes.
+
+ print "Listening as %010x on %i MHz" % (client.RF_getsmac(),
+ client.RF_getfreq()/10**6);
+ print "Expect some false-positives.";
+
+ #Now we're ready to get packets.
+ while 1:
+ packet=None;
+ while packet==None:
+ #time.sleep(0.1);
+ packet=client.RF_rxpacket();
+ printpacket(packet);
+ sys.stdout.flush();
+
+if(sys.argv[1]=="snifftp"):
+ client.poke(0x00,0x00); #Stop nRF
+ client.poke(0x01,0x00); #Disable Shockburst
+ client.poke(0x02,0x01); #Set RX Pipe 0
+
+ #Disable shockburst.
+ client.poke(0x1C,0x00);
+ client.poke(0x1D,0x00);
+
+ client.RF_setfreq((2400+0x29) * 10**6);
+ client.poke(0x06,0x00); #1Mbps
+ client.poke(0x07,0x78); #Reset status register
+
+ client.RF_setmaclen(3); # SETUP_AW for 3-byte addresses.
+ client.RF_setsmac(0x123456);
+ client.RF_setpacketlen(4);
+
+ #Power radio, prime for RX, two-byte checksum.
+ #client.poke(0x00,0x70|0x03|0x04|0x08);
+
+ #Power radio, prime for RX, no checksum.
+ client.poke(0x00,0x70|0x03);
+
+
+ print "Listening as %010x on %i MHz" % (client.RF_getsmac(),
+ client.RF_getfreq()/10**6);
+ #Now we're ready to get packets.
+ while 1:
+ packet=None;
+ while packet==None:
+ #time.sleep(0.1);
+ packet=client.RF_rxpacket();
+ printpacket(packet);
+ sys.stdout.flush();
+
+
+if(sys.argv[1]=="sniff"):
+ if len(sys.argv)>2:
+ print "Set MAC to %s" % sys.argv[2];
+ client.tune(sys.argv[2]);
+ client.RF_setmaclen(5);
+
+ #client.poke(0x00,0x00); #Stop nRF
+ client.poke(0x07,0x78); #Reset status register
+
+ #Power radio, prime for RX, no checksum.
+ client.poke(0x00,0x70|0x03);
+ #Mac packet length.
+ client.RF_setpacketlen(32);
+ #Mac length, reduced
+ #client.RF_setmaclen(3); # SETUP_AW for shortest
+
+ print "Listening as %010x on %i MHz" % (client.RF_getsmac(),
+ client.RF_getfreq()/10**6);
+ #Now we're ready to get packets.
+
+ while 1:
+ packet=None;
+ while packet==None:
+ #time.sleep(0.1);
+ packet=client.RF_rxpacket();
+ printpacket(packet);
+ sys.stdout.flush();
+if(sys.argv[1]=="explore"):
+ #client.poke(0x00,0x00); #Stop nRF
+ client.poke(0x07,0x78); #Reset status register
+
+ #Power radio, prime for RX, no checksum.
+ client.poke(0x00,0x70|0x03);
+
+ #Set packet length of 32.
+ #Without checksums, extra data will mix in.
+ client.RF_setpacketlen(32);
+ client.RF_setmaclen(3); # shortest address length
+
+ #Now we're ready to get packets.
+ for smac in [0x0102030201, 0]:
+ client.RF_setsmac(smac);
+ for chan in range(0,0x80):
+ client.RF_setfreq((2400+chan) * 10**6);
+ time.sleep(1);
+ packet=client.RF_rxpacket();
+ if packet!=None:
+ print "Listening as %010x on %i MHz" % (client.RF_getsmac(),
+ client.RF_getfreq()/10**6);
+ printpacket(packet);
+ sys.stdout.flush();