Crates.io | btsnoop-extcap |
lib.rs | btsnoop-extcap |
version | 0.1.6 |
source | src |
created_at | 2023-02-10 08:21:33.111831 |
updated_at | 2024-02-06 02:31:34.367444 |
description | View Android's btsnoop logs (Bluetooth HCI logs) in Wireshark |
homepage | |
repository | https://github.com/mauricelam/btsnoop-extcap/ |
max_upload_size | |
id | 781721 |
size | 72,888 |
$ cargo install btsnoop-extcap
# Running btsnoop-extcap from command line is not part of the normal workflow,
# but it will print out installation instructions. For example:
$ btsnoop-extcap
Unknown extcap phase. This is an extcap plugin meant to be used with Wireshark or tshark.
To install this plugin for use with Wireshark, symlink or copy this executable
to your Wireshark extcap directory
# Run the symlink command in the error message (for Wireshark 4.1 or later)
$ mkdir -p "$HOME/.local/lib/wireshark/extcap/" && \
ln -s "$HOME/.cargo/bin/btsnoop-extcap" "$HOME/.local/lib/wireshark/extcap/btsnoop-extcap"
# or for Wireshark 4.0 or before
$ mkdir -p "$HOME/.cargo/wireshark/extcap/" && \
ln -s "$HOME/.cargo/bin/btsnoop-extcap" "$HOME/.cargo/wireshark/extcap/btsnoop-extcap"
Root is required on the selected Android device.
This extcap plugin is designed to be used with Wireshark or tshark, and will show a live stream of Bluetooth HCI events from the selected device.
Detected devices are shown in Wireshark's Capture interface list.
adb root
androiddump
Wireshark has androiddump
as one of the included extcap implementations. It is
based on an old configuration in Android that forwarded the btsnoop logs to port
8872, which was
disabled
in 2015. While it can be turned back on by changing the source code, recompiling
Android is inconvenient in some cases.
Meanwhile, Android continues to provide the option to write the HCI logs to a
local log file (in the /system
partition, so root access is required to read
it), and that is what this extcap uses as the packet source.