Analyzing iBeacon traffic using nRF BLE Sniffer
I’ve been troubleshooting iBeacons lately, and Bluetooth LE Sniffer from Adafruit is my go-to tool for sniffing Bluetooth LE (BLE) traffic such as iBeacon advertisements. iBeacon detection can vary a lot depending on advertisement interval and timing, and signal strength and its variance with distance, line of sight (or lack thereof), interference with other iBeacons etc.
nRF Sniffer software captures all BLE traffic in libpcap format that can be viewed in Wireshark 2.4. If you’re using an older version of Wireshark, I have ported the native dissector to Lua that should work starting from Wireshark 1.12.
Here’s an iBeacon advertisement dissected using the nordic_ble Lua dissector, and Wireshark’s native btle dissector, on macOS. Note that iBeacon payload proprietary to Apple is not yet decoded by Wireshark’s btle dissector.
Using data from the packet shown above, Apple’s proprietary payload has the following format
|15||Length (21 bytes)|
|b6||two’s complement of calibrated TX power|
A filter such as
btcommon.eir_ad.entry.data contains e4:f2:e4:c1 can be used to filter packets based on major and minor numbers.