6.4 Sniffing the Pairing Procedure of a Connection
This allows the user to observe an encrypted connection between paired devices by monitoring the pairing procedure.
Note: If the board running in the Microchip RF Sniffer firmware is reset, stored bond information will be lost.
The following are the steps for monitoring the pairing process within a connection:
- Run the Bluetooth Low Energy Sniffer (if not already running).
- Choose the device from the list of devices.
- Input the pairing credentials.
The procedure will vary based on the encryption type.
For connections using just works method as legacy pairing:- Begin the pairing process between the devices if it does not initiate automatically.
- Start the pairing process between the devices if it does not initiate automatically.
- Choose Legacy Passkey as the input key and input the 6-digit passkey shown on either the central or the peripheral into the Wireshark input field, then press <Enter>.
- Input the passkey into the alternate device.
For connections that utilize legacy pairing with OOB:
- Before the devices start the pairing process, choose legacy OOB data as the input key. Then, input the OOB key in big-endian, hexadecimal format with a leading 0x into the designated input field in Wireshark, then press <Enter>.
- Now, establish a connection between the central and the peripheral devices. If the pairing does not initiate automatically, the user needs to manually start it.
To establish connections using LE secure connections in the Debug mode:
For connections that utilize LE secure connections with a private key:- Activate the Secure Connections Debug mode on either one or both devices.
- If pairing does not start automatically, initiate it manually.
- In the Debug mode, the connection utilizes the debug keys as outlined in the Bluetooth Core Specification. The Bluetooth Low Energy Sniffer employs these same keys to decipher the encrypted packets.
- Before initiating the pairing process between devices, choose SC Private Key as the input key.
- Then, input the device's 32-byte DiffieHellman private key in big-endian, hexadecimal format with a leading 0x into the Wireshark input field.
- If pairing does not start automatically, initiate it manually.