{"id":209,"date":"2020-10-10T22:24:51","date_gmt":"2020-10-10T21:24:51","guid":{"rendered":"https:\/\/rfhyper.wordpress.com\/?p=209"},"modified":"2020-10-10T22:24:51","modified_gmt":"2020-10-10T21:24:51","slug":"analyse-du-protocole-zigbee-sniffer-cc2531","status":"publish","type":"post","link":"https:\/\/leblogrf.fr\/index.php\/2020\/10\/10\/analyse-du-protocole-zigbee-sniffer-cc2531\/","title":{"rendered":"Analyse du protocole Zigbee : Sniffer CC2531"},"content":{"rendered":"\n<p>Le but de cet article est d&rsquo;analyser le protocole sans fil Zigbee \u00e0 l&rsquo;aide d&rsquo;un sniffer USB. Pour cela on va intercepter les communications entre une passerelle Xiaomi et un capteur de temp\u00e9rature et d&rsquo;humidit\u00e9 avec un dongle USB. L&rsquo;objectif \u00e9tant d&rsquo;arriver \u00e0 lire les informations de temp\u00e9rature du capteur.<br>Cet article est inspir\u00e9 d&rsquo;un tr\u00e8s bon article du Blog \u00ab\u00a0Faire Soi-M\u00eame\u00a0\u00bb (lien en bas de la page), mais en utilisant d&rsquo;autre outils.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Achats<\/h2>\n\n\n\n<p>Tout d&rsquo;abord, il faut acheter au minimum dongle USB avec le composant CC2531 et avec un c\u00e2ble de programmation :<br>L&rsquo;original du fabricant TI \u00e0 la r\u00e9f\u00e9rence CC2531EMK, mais il en existe des similaires sur des sites comme Amazon, AliExpress ou LeBonCoin<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.amazon.fr\/gp\/product\/B07YDG4QHM\" target=\"_blank\">https:\/\/www.amazon.fr\/gp\/product\/B07YDG4QHM<\/a><br>Ensuite, un programmateur CC DEBUG :<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.amazon.fr\/gp\/product\/B07FP5XHPM\" target=\"_blank\">https:\/\/www.amazon.fr\/gp\/product\/B07FP5XHPM<\/a><br>Et aussi un capteur avec sa passerelle qui vont communiquer avec le protocole Zigbee.<br>La passerelle :<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.amazon.fr\/gp\/product\/B082XCWH71\" target=\"_blank\">https:\/\/www.amazon.fr\/gp\/product\/B082XCWH71<\/a><br>Le capteur de temp\u00e9rature et d&rsquo;humidit\u00e9 :<br><a rel=\"noreferrer noopener\" href=\"https:\/\/fr.aliexpress.com\/item\/32711728819.html\" target=\"_blank\">https:\/\/fr.aliexpress.com\/item\/32711728819.html<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/qq-xiaomi-capteur-de-temperature-et-d-humidite-wif-1.jpg?w=399\" alt=\"\" class=\"wp-image-260\" width=\"135\" height=\"138\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/qq-xiaomi-capteur-de-temperature-et-d-humidite-wif-1.jpg 399w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/qq-xiaomi-capteur-de-temperature-et-d-humidite-wif-1-293x300.jpg 293w\" sizes=\"auto, (max-width: 135px) 100vw, 135px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">2. Installation<\/h2>\n\n\n\n<p>Installer le logiciel SmartRF Flash programmer de Texas Instruments. Ne pas utiliser la version V2 qui n&rsquo;est pas compatible avec le CC DEBUGGER. Par exemple la version 1.12.8 du 31 Mai 2016.<br>Le logiciel est gratuit, mais il faut avoir un compte TI pour le t\u00e9l\u00e9charger.<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ti.com\/tool\/FLASH-PROGRAMMER\" target=\"_blank\">https:\/\/www.ti.com\/tool\/FLASH-PROGRAMMER<\/a><br>Ensuite, il faut installer le driver pour le CC DEBUGGER :<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ti.com\/lit\/zip\/swrc212\" target=\"_blank\">https:\/\/www.ti.com\/lit\/zip\/swrc212<\/a><br>Apr\u00e8s avoir installer le driver, connecter le CC DEBUGGER au PC.V\u00e9rfier que le debugger est bien reconnu en ouvrant le \u00ab\u00a0Gestionnaire de P\u00e9riph\u00e9riques\u00a0\u00bb de Windows. Le debugger devrait apparaitre comme un \u00ab\u00a0Cebal controlled device\u00a0\u00bb<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"280\" height=\"183\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/09\/image.png?w=280\" alt=\"\" class=\"wp-image-221\" \/><figcaption>V\u00e9rification du driver du CC DEBUGGER<\/figcaption><\/figure><\/div>\n\n\n\n<p>Si le driver, n&rsquo;est pas install\u00e9 correctement, vous pouvez installer le driver manuellement.<br>Installer le logiciel PACKET-SNIFFER. (Pas la v2,  la version v2.18.1 du 30 Juin 2014) pour r\u00e9cup\u00e9rer un fichier dans<br>C:\\Program Files (x86)\\Texas Instruments\\SmartRF Tools\\Packet Sniffer\\bin\\general\\firmware\\sniffer_fw_cc2531.hex<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Connecter le CC DEBUGGER<\/h2>\n\n\n\n<p>Brancher le CC DEBUGGER \u00e0 un port USB du PC puis au dongle CC2131 qui lui m\u00eame doit \u00eatre connect\u00e9 \u00e0 un autre port USB du PC, comme sur la figure ci-dessous :<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/09\/2020-09-13_16-27-43_335-1.jpeg?w=1024\" alt=\"\" class=\"wp-image-224\" width=\"569\" height=\"426\" \/><figcaption>Branchements<\/figcaption><\/figure><\/div>\n\n\n\n<p>Appuyer sur le bouton RESET du CC DEBUGGER, la LED devrait s&rsquo;allumer en vert.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4.Programmation<\/h2>\n\n\n\n<p>Ex\u00e9cuter le logiciel Flash Programmer, dans la section Flash image, s\u00e9lectionnez le fichier sniffer_fw_cc2531.hex dans le r\u00e9pertoire C:\\Program Files (x86)\\Texas Instruments\\SmartRF Tools\\Packet Sniffer\\bin\\general\\firmware\\<br>Cliquer sur \u00ab\u00a0Perform actions\u00a0\u00bb<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/09\/flashok.jpg?w=938\" alt=\"\" class=\"wp-image-226\" width=\"527\" height=\"425\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/09\/flashok.jpg 938w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/09\/flashok-300x242.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/09\/flashok-768x620.jpg 768w\" sizes=\"auto, (max-width: 527px) 100vw, 527px\" \/><figcaption>TI Flash Programmer<\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">4. Installation des logiciels<\/h2>\n\n\n\n<p>T\u00e9l\u00e9charger le logiciel Wireshark et l&rsquo;installer<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.wireshark.org\/#download\" target=\"_blank\">https:\/\/www.wireshark.org\/#download<\/a><br>Prendre une version v3.0.x et pas la derni\u00e8re car elles ne sont pas toutes compatible avec les logiciels TI (Par exemple Wireshark-win64-3.0.12.exe)<br>T\u00e9l\u00e9charger le logiciel SmartRF Packet Sniffer2, cette fois ci. (version v1.8.0 du 22 janvier 2020 par exemple) et l&rsquo;installer.<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ti.com\/tool\/PACKET-SNIFFER\" target=\"_blank\">https:\/\/www.ti.com\/tool\/PACKET-SNIFFER<\/a><br>Mais toujours pas pour l&rsquo;utiliser mais pour r\u00e9cup\u00e9rer certains fichiers dans C:\\Program Files (x86)\\Texas Instruments\\SmartRF Tools\\SmartRF Packet Sniffer 2\\wireshark\\plugins\\3.0.x<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/plugins.jpg?w=262\" alt=\"\" class=\"wp-image-229\" width=\"175\" height=\"116\" \/><\/figure>\n\n\n\n<p>Les copier dans le r\u00e9pertoire suivant :<br>C:\\Program Files\\Wireshark\\plugins\\3.0<br>T\u00e9l\u00e9charger et installer TI Wireshark Packet Converter (TiWsPc) :<br><a rel=\"noreferrer noopener\" href=\"https:\/\/e2e.ti.com\/cfs-file\/__key\/communityserver-discussions-components-files\/158\/TiWsPc.zip\" target=\"_blank\">https:\/\/e2e.ti.com\/cfs-file\/__key\/communityserver-discussions-components-files\/158\/TiWsPc.zip<\/a><br>Executer le logiciel TiWsPc.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/ti-wireshark-packet-converter.jpg?w=659\" alt=\"\" class=\"wp-image-231\" width=\"365\" height=\"261\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/ti-wireshark-packet-converter.jpg 659w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/ti-wireshark-packet-converter-300x214.jpg 300w\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" \/><\/figure>\n\n\n\n<p>Cliquer sur Device Configuration, s\u00e9lectionner le canal et cliquer sur Start.<br>Le canal par d\u00e9faut est le 13, mais dans certains cas, les \u00e9quipements communiquent sur d&rsquo;autres canaux, comme le 20 ici. Il faut les tester un par un et attendre de recevoir des \u00ab\u00a0packets\u00a0\u00bb.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/tiwspcdeviceconfiguration.jpg?w=1024\" alt=\"\" class=\"wp-image-233\" width=\"638\" height=\"112\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/tiwspcdeviceconfiguration.jpg 1226w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/tiwspcdeviceconfiguration-300x53.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/tiwspcdeviceconfiguration-1024x180.jpg 1024w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/tiwspcdeviceconfiguration-768x135.jpg 768w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/figure>\n\n\n\n<p>Ex\u00e9cuter Wireshark :<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark1.jpg?w=865\" alt=\"\" class=\"wp-image-239\" width=\"452\" height=\"260\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark1.jpg 865w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark1-300x173.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark1-768x442.jpg 768w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/figure>\n\n\n\n<p>Aller dans le menu Capture-&gt;Option<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark3.jpg?w=952\" alt=\"\" class=\"wp-image-241\" width=\"567\" height=\"285\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark3.jpg 952w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark3-300x151.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark3-768x386.jpg 768w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><\/figure>\n\n\n\n<p>Puis cliquer sur \u00ab\u00a0G\u00e9rer les interfaces&#8230;\u00a0\u00bb<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark3-1.jpg?w=952\" alt=\"\" class=\"wp-image-243\" width=\"569\" height=\"286\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark3-1.jpg 952w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark3-1-300x151.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark3-1-768x386.jpg 768w\" sizes=\"auto, (max-width: 569px) 100vw, 569px\" \/><\/figure>\n\n\n\n<p>Puis l&rsquo;onglet \u00ab\u00a0Pipes\u00a0\u00bb, cr\u00e9er une entr\u00e9e avec \u00ab\u00a0\\.\\pipe\\tiwspc_data\u00a0\u00bb<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark4.jpg?w=752\" alt=\"\" class=\"wp-image-245\" width=\"549\" height=\"339\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark4.jpg 752w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark4-300x185.jpg 300w\" sizes=\"auto, (max-width: 549px) 100vw, 549px\" \/><\/figure>\n\n\n\n<p>Cliquer sur OK puis D\u00e9marrer.<br>Prendre la passerelle Xiaomi et le capteur de temp\u00e9rature. Faire une association entre les deux.<br>Les premi\u00e8re trames Zigbee devraient apparaitre dans Wireshark. Mais elles sont crypt\u00e9es. En effet, le protocole Zigbee utilise un syst\u00e8me de cryptage AES 128.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark9.jpg?w=1024\" alt=\"\" class=\"wp-image-265\" width=\"599\" height=\"294\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark9.jpg 1388w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark9-300x147.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark9-1024x503.jpg 1024w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark9-768x377.jpg 768w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">5. D\u00e9codage des trames<\/h2>\n\n\n\n<p>Il est possible de d\u00e9coder les trames.<br>Pour cela, il faut entrer une cl\u00e9, la Trust Center Link Key dans le logiciel Wireshark.<br>Aller dans le menu Editer-&gt;Pr\u00e9f\u00e9rences<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark5.jpg?w=484\" alt=\"\" class=\"wp-image-247\" width=\"390\" height=\"501\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark5.jpg 484w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark5-233x300.jpg 233w\" sizes=\"auto, (max-width: 390px) 100vw, 390px\" \/><\/figure>\n\n\n\n<p>Rechercher \u00ab\u00a0Protocols\u00a0\u00bb puis \u00ab\u00a0Zigbee\u00a0\u00bb.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark6.jpg?w=798\" alt=\"\" class=\"wp-image-249\" width=\"500\" height=\"322\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark6.jpg 798w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark6-300x193.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark6-768x495.jpg 768w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<p>Cliquer sur Edit et entrer la cl\u00e9 :<br>5A:69:67:42:65:65:41:6C:6C:69:61:6E:63:65:30:39<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark7.jpg?w=719\" alt=\"\" class=\"wp-image-251\" width=\"418\" height=\"257\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark7.jpg 719w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark7-300x184.jpg 300w\" sizes=\"auto, (max-width: 418px) 100vw, 418px\" \/><\/figure>\n\n\n\n<p>Dans Wireshark, une parties des trames vont \u00eatre automatiquement d\u00e9crypt\u00e9es.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark10.jpg?w=1024\" alt=\"\" class=\"wp-image-266\" width=\"607\" height=\"284\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark10.jpg 1383w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark10-300x141.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark10-1024x481.jpg 1024w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark10-768x360.jpg 768w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/figure>\n\n\n\n<p>On peut voir une trame \u00ab\u00a0Transport Key\u00a0\u00bb, qui contient la Network Key<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark11-1.jpg?w=1024\" alt=\"\" class=\"wp-image-269\" width=\"579\" height=\"346\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark11-1.jpg 1255w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark11-1-300x180.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark11-1-1024x614.jpg 1024w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark11-1-768x460.jpg 768w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/figure>\n\n\n\n<p>Wireshark r\u00e9cup\u00e9re directement cette cl\u00e9 et d\u00e9crypte toutes les trames. La Network Key peut aussi \u00eatre enregistr\u00e9e dans Wireshark, comme la Trust Center Link Key (voir m\u00e9thode ci-dessus) si on souhaite faire d&rsquo;autres enregistrements plus tard.<br>Et voil\u00e0, maintenant on peut ainsi lire les informations utiles du capteur comme la temp\u00e9rature dans les trames ZCL (Zigbee Cluster Library) :<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1132\" height=\"706\" src=\"http:\/\/leblogs.cluster029.hosting.ovh.net\/wp-content\/uploads\/2020\/10\/wireshark12-1.jpg?w=1024\" alt=\"\" class=\"wp-image-273\" srcset=\"https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark12-1.jpg 1132w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark12-1-300x187.jpg 300w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark12-1-1024x639.jpg 1024w, https:\/\/leblogrf.fr\/wp-content\/uploads\/2020\/10\/wireshark12-1-768x479.jpg 768w\" sizes=\"auto, (max-width: 1132px) 100vw, 1132px\" \/><\/figure>\n\n\n\n<p><br>Liens utiles :<br><a rel=\"noreferrer noopener\" href=\"http:\/\/faire-ca-soi-meme.fr\/domotique\/2017\/02\/27\/hack-xiaomi-mi-smart-temperature-and-humidity-sensor\/\" target=\"_blank\">http:\/\/faire-ca-soi-meme.fr\/domotique\/2017\/02\/27\/hack-xiaomi-mi-smart-temperature-and-humidity-sensor\/<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/connect.ed-diamond.com\/MISC\/MISC-086\/Tout-tout-tout-vous-saurez-tout-sur-le-ZigBee\" target=\"_blank\">https:\/\/connect.ed-diamond.com\/MISC\/MISC-086\/Tout-tout-tout-vous-saurez-tout-sur-le-ZigBee<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/lucidar.me\/fr\/zigbee\/zigbee-sniffer\/\" target=\"_blank\">https:\/\/lucidar.me\/fr\/zigbee\/zigbee-sniffer\/<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ti.com\/tool\/CC2531EMK\" target=\"_blank\">https:\/\/www.ti.com\/tool\/CC2531EMK<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.zigbee2mqtt.io\/how_tos\/how_to_sniff_zigbee_traffic.html\" target=\"_blank\">https:\/\/www.zigbee2mqtt.io\/how_tos\/how_to_sniff_zigbee_traffic.html<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/sunmaysky.blogspot.com\/2018\/10\/how-to-use-cc2531emk-and-wireshark-as.html\" target=\"_blank\">https:\/\/sunmaysky.blogspot.com\/2018\/10\/how-to-use-cc2531emk-and-wireshark-as.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le but de cet article est d&rsquo;analyser le protocole sans fil Zigbee \u00e0 l&rsquo;aide d&rsquo;un sniffer USB. Pour cela on va intercepter les communications entre une passerelle Xiaomi et un capteur de temp\u00e9rature et d&rsquo;humidit\u00e9 avec un dongle USB. L&rsquo;objectif \u00e9tant d&rsquo;arriver \u00e0 lire les informations de temp\u00e9rature du capteur.Cet article est inspir\u00e9 d&rsquo;un tr\u00e8s &hellip; <a href=\"https:\/\/leblogrf.fr\/index.php\/2020\/10\/10\/analyse-du-protocole-zigbee-sniffer-cc2531\/\" class=\"more-link\">Continuer la lecture de <span class=\"screen-reader-text\">Analyse du protocole Zigbee : Sniffer CC2531<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":275,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zigbee"],"_links":{"self":[{"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/posts\/209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/comments?post=209"}],"version-history":[{"count":0,"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/posts\/209\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/media\/275"}],"wp:attachment":[{"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/media?parent=209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/categories?post=209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leblogrf.fr\/index.php\/wp-json\/wp\/v2\/tags?post=209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}