Return to site

Cc2540 Driver Github

broken image


Project CC2540
Reverse engineering the CC2540 BLE sniffer dongle
StatusStalled
Contactbertrik
Last Update2018-05-13
  1. Usb Cc2540 Hid Driver
  2. Cc2540 Hid
  • 3Analysis
  • 4Protocol
    • 4.2Reading BLE frames

The driver under C: Texas Instruments BLE-CC2540-1.1a Accessories Drivers is the serial driver used when the USB dongle is running the BLE application example (for communication with BTool). The driver under C: Program Files (x86) Texas Instruments SmartRF Tools Drivers Cebal win64bitx64 is the driver you need when running the BLE packet. Only US$11.27, buy best ble nano v3.0 mirco usb board integrate cc2540 ble wireless module atmega328p micro-controller development board geekcreit for arduino - products that work with official arduino boards sale online store at wholesale price. Shopping Southeast Asia. CC2540: CC2540 USB Dongle Windows 10 x64 Driver. Prodigy 80 points user4465486 Replies: 1. Part Number: CC2540. Where can I get CC2540 USB dongle driver?

Status

At this point (2017-05-09), the status is:

Cc2540 driver arduino
  • it is pretty clear which commands the default sniffer firmware understands
  • I wrote a little test program to dump raw BLE frames
  • there is no plugin for WireShark yet

Introduction

This page is about the CC2540 bluetooth low-energy sniffer dongle and getting it to work with Linux.A nice end result could be that it becomes possible to sniff directly in WireShark with this dongle.

I have such a 'WeBee' dongle that can be found for about E15,- on websites like Aliexpress.

It's supposedly a CC2540 (or compatible) dongle, the USB id is 0451:16b3.

Interesting links:

Analysis

USB descriptor

When plugging this stick into a Linux machine, you can see it uses only one bulk endpoint.

Reading the identification from the stick with the 0xC0 command, results in the following 8-byte response

You can recognise the 2540 type number in there.

USB logs from Windows

This USB device does actually work with Windows:

I've captured a log of the communication over USB while the BLE is capturing bluetooth traffic from some iBeacon, using USB pcap.

In the logs, I cannot see any firmware blobs being downloaded to the stick.Probably the stick comes with a pre-loaded firmware of itself to do the BLE sniffing.

The USB control transfer request codes seem to match up with the code in https://github.com/christianpanton/ccsniffer/blob/master/ccsniffer.py

Usb Cc2540 Hid Driver

  • 0xC0, GET_IDENT: returns some kind of identifier
  • 0xC5, SET_POWER
  • 0xC6, GET_POWER
  • 0xC9, no idea, this appears in my USB logs but I can't find it in the python code
  • 0xD0, START
  • 0xD1, STOP
  • 0xD2, SET CHAN

Protocol

In the windows sniffer software, it seems there are only two things communicated:

  • towards the stick: which radio channel to sniff, and some other radio settings
  • from the stick: raw sniffed BLE frames

Configuring the radio

This appears to be done using USB control transfers.

The following requests are sent:

Cc2540 Driver Github
Request typeRequestValueIndexDataDescription
0x400xC504-Set power
0xC00xC6000x00Get power
0xC00xC6000x04Get power
0x400xC900-???
0x400xD2000x27Set channel
0x400xD2010x00Set channel
0x400xD000-Start capture

Request type 0x40 is a vendor-specific device request from host-to-device.Request type 0xC0 is a vendor-specific device request from device-to-host.

Reading BLE frames

This appears to be done using USB bulk input transfers.

I can see a lot of similarities between the USB log and the BLE sniffer log.

Hid

Each frame starts with a byte indicating the type of frame, following by two bytes indicating the length of the rest of the frame (encoded as little endian).

data frames

The bulk USB data starts off with two bytes indicating the length of the rest of the data.

In the example image on the right:

  • 00: 0 means this is a data frame
  • 31 00: length of rest of frame encoded in little endian = 49 bytes decimal
  • 39 04 29 54: part of the time stamp
  • 2c d6 be ..: data frame contents

unknown frames (tick or 'alive'?)

The stick also returns 4-byte frames, alternating between

and

Interpretation:

  • 01: 1 means this is a frame of type 1
  • 01 00: length of the rest of the frame encoded in little endian = 1 byte
  • 40 or C0: unknown data byte

Software

Preliminary code can be found athttps://github.com/bertrik/cc2540

Usb cc2540 hid driver

It connects to the dongle and dumps raw USB packets to stdout.

Github
  • it is pretty clear which commands the default sniffer firmware understands
  • I wrote a little test program to dump raw BLE frames
  • there is no plugin for WireShark yet

Introduction

This page is about the CC2540 bluetooth low-energy sniffer dongle and getting it to work with Linux.A nice end result could be that it becomes possible to sniff directly in WireShark with this dongle.

I have such a 'WeBee' dongle that can be found for about E15,- on websites like Aliexpress.

It's supposedly a CC2540 (or compatible) dongle, the USB id is 0451:16b3.

Interesting links:

Analysis

USB descriptor

When plugging this stick into a Linux machine, you can see it uses only one bulk endpoint.

Reading the identification from the stick with the 0xC0 command, results in the following 8-byte response

You can recognise the 2540 type number in there.

USB logs from Windows

This USB device does actually work with Windows:

I've captured a log of the communication over USB while the BLE is capturing bluetooth traffic from some iBeacon, using USB pcap.

In the logs, I cannot see any firmware blobs being downloaded to the stick.Probably the stick comes with a pre-loaded firmware of itself to do the BLE sniffing.

The USB control transfer request codes seem to match up with the code in https://github.com/christianpanton/ccsniffer/blob/master/ccsniffer.py

Usb Cc2540 Hid Driver

  • 0xC0, GET_IDENT: returns some kind of identifier
  • 0xC5, SET_POWER
  • 0xC6, GET_POWER
  • 0xC9, no idea, this appears in my USB logs but I can't find it in the python code
  • 0xD0, START
  • 0xD1, STOP
  • 0xD2, SET CHAN

Protocol

In the windows sniffer software, it seems there are only two things communicated:

  • towards the stick: which radio channel to sniff, and some other radio settings
  • from the stick: raw sniffed BLE frames

Configuring the radio

This appears to be done using USB control transfers.

The following requests are sent:

Request typeRequestValueIndexDataDescription
0x400xC504-Set power
0xC00xC6000x00Get power
0xC00xC6000x04Get power
0x400xC900-???
0x400xD2000x27Set channel
0x400xD2010x00Set channel
0x400xD000-Start capture

Request type 0x40 is a vendor-specific device request from host-to-device.Request type 0xC0 is a vendor-specific device request from device-to-host.

Reading BLE frames

This appears to be done using USB bulk input transfers.

I can see a lot of similarities between the USB log and the BLE sniffer log.

Each frame starts with a byte indicating the type of frame, following by two bytes indicating the length of the rest of the frame (encoded as little endian).

data frames

The bulk USB data starts off with two bytes indicating the length of the rest of the data.

In the example image on the right:

  • 00: 0 means this is a data frame
  • 31 00: length of rest of frame encoded in little endian = 49 bytes decimal
  • 39 04 29 54: part of the time stamp
  • 2c d6 be ..: data frame contents

unknown frames (tick or 'alive'?)

The stick also returns 4-byte frames, alternating between

and

Interpretation:

  • 01: 1 means this is a frame of type 1
  • 01 00: length of the rest of the frame encoded in little endian = 1 byte
  • 40 or C0: unknown data byte

Software

Preliminary code can be found athttps://github.com/bertrik/cc2540

It connects to the dongle and dumps raw USB packets to stdout.

This software requires libusb-1.0-dev

Cc2540 Hid

Retrieved from ‘https://revspace.nl/index.php?title=CC2540&oldid=18383'




broken image