1. Introduction
The STM32 Sniffer for Bluetooth® Low Energy is composed of two main parts:
- The software part running on the computer: analyzes and displays packets.
- The firmwares part running on the STM32WB, STM32WB09 MCUs: intercepts over the air packets.
There are two sniffer firmwares targeting the following devices:
- STM32WB55
- STM32WB09
| STM32WB55 System Architecture |
|---|
Download the necessary STM32WB55 files on the STM32 hotspot.
| STM32WB09 System Architecture |
|---|
Download the necessary STM32WB09 files on the STM32 hotspot.
2. Minimum requirements
The following software and hardware parts are needed.
2.1. Hardware
At least one of these STM32WB55 development boards is needed:
The following STM32WB09 development boards is needed:
2.2. Software
Operating system:
- Windows 10 or 11
- Version 4.0.3 or later
- During the setup, accept the installation of Ncap.
- Version 3.11.2 or later
- Add Python to your path (you can select “Add Python to environment variable.” during setup).
- Version 3.5 or later
- Make sure that PySerial is installed on the correct version of Python if you have multiple installations. Use pip3 for example to force install on Python3.
libscrc python library is required from st_ble_sniffer_stm32wb09.py:
- Version 1.8.1
- Make also sure Microsoft C++ 14.0 or later Build Tools - Visual Studio libs is installed on you PC (https://visualstudio.microsoft.com/visual-cpp-build-tools/ - Microsoft Q&A)
3. Programming the board
3.1. STM32WB55 steps
There are two files to flash:
- The sniffer application: stm32wb55_ble_sniffer_cm4_app_nucleo.hex or stm32wb55_ble_sniffer_cm4_app_dk.hex
- The sniffer Bluetooth® LE wireless stack: stm32wb55_ble_sniffer_cm0_stack.bin
1. Install STM32CubeProgrammer
2. Update the wireless stack:
- Use the stm32wb55_ble_sniffer_cm0_stack.bin file at the start address: 0x080CE000.
- Follow the part 3.2 of the tutorial to learn how to update the wireless stack.
3. Flash the application firmware:
- Use the stm32wb55_ble_sniffer_cm4_app_nucleo.hex or stm32wb55_ble_sniffer_cm4_app_dk.hex file.
- Follow the part 3.3 of the tutorial to learn how to flash the application firmware.
3.2. STM32WB09 steps
There is one file to flash:
- The sniffer application: STM32WB09_BLE_Sniffer.hex
1. Install STM32CubeProgrammer
2. Update the sniffer application firmware:
- Use the STM32WB09_BLE_Sniffer.hex or STM32WB09_BLE_Sniffer.bin file at the start address: 0x10040000
- Follow the part 4.4 of the tutorial to learn how to flash the application firmware.
4. Installing Wireshark plugins
Launch Wireshark:
| Finding the Wireshark plugins directories |
|---|
4.1. Installing the plugins
4.2. STM32WB55 steps
- Copy the st_ble_sniffer_dissector.lua file into your Wireshark Personal Lua Plugins folder.
- Copy the st_ble_sniffer.py and st_ble_sniffer.bat files into your Wireshark Personal Extcap path folder.
Your folders should look like this:
| Plugins folders |
|---|
- Open a command prompt in your Personal Extcap path folder.
- Run: st_ble_sniffer.bat --extcap-interfaces
You should have an output similar to this:
| Verifying that the extcap plugin runs |
|---|
- Make sure that the board with the sniffer firmware is plugged, and that no other programs use the com port such as the serial terminal.
- In Wireshark, refresh the capture interfaces list:
| Verifying extcap plugin can run in Wireshark |
|---|
You should now see the STM32WB sniffer interface like this:
| Verifying that extcap plugin runs in Wireshark |
|---|
4.3. STM32WB09 steps
Repeat the same steps as STM32WB55 ones, using the following files:
- st_ble_sniffer_dissector_wb09.lua
- st_ble_sniffer_wb09.py
- st_ble_sniffer_wb09.bat
It is important to create a Python virtual environment inside your personal extcap folder by launching the following commands in a Windows terminal
1. Create virtual environment:
> python -m venv venv
2. Activate virtual environment:
> venv\Scripts\activate
3. Install required python libraries:
> pip install -r requirements.txt
You should now be able to see the STM32WB09 sniffer interface in Wireshark.
4.4. Installing the profile
In Wireshark:
| Finding the Wireshark profiles directory |
|---|
Copy the ST_BLE_Sniffer_profile folder (for STM32WB55) or ST_BLE_Sniffer_profile_stm32wb09 folder (for STM32WB09) into your Wireshark Personal configuration/profiles folder.
Your folder should look like this:
| Verifying that extcap plugin runs in Wireshark |
|---|
5. Configuring Wireshark
5.1. Enabling the sniffer profile
In Wireshark:
| Enabling the profile |
|---|
5.2. Enabling the interface toolbar
Open Wireshark:
| Enabling the interface toolbar |
|---|
These toolbars should be visible:
| STM32WB55 Interface toolbar |
|---|
| STM32WB09 Interface toolbar |
|---|
5.3. Testing
Double click on the STM32WB or STM32WB09 sniffer interface to launch the capture.
| Verifying that extcap plugin runs in Wireshark |
|---|
If advertising packets are visible like in the graphic below, it means that the installation of the STM32 Sniffer for Bluetooth® Low Energy is successful.
| Verifying the installation |
|---|
Refer to theuser guide to learn more about how to use the sniffer.

