tinySniffer WiFi-connected USB sniffer is based on NanoPi NEO Air SBC

TinySniffer is a  USB sniffer based on the Allwinner H3-powered NanoPi Neo Air SBC, designed to capture USB 1.x and 2.0 packets remotely, and whose captured data is compatible with the popular Wireshark packet analyzer tool.

Wireshark can already be used to capture USB packets on its own and I reverse-engineered a USB capture video solution that way in the past, but this method has some limitations, for instance, it does not capture some low-level USB packets, in which case a hardware USB sniffer like Total Phase Beagle USB, the PhyWhisperer USB, or the tinySniffer is required.

tinySniffer USB capture device

The micro USB OTG port of the NanoPi NEO Air SBC is connected to the host computer and the company added a USB 2.0 Type-A port connected to the USB interface on the GPIO header to connect a device under test such as a USB keyboard, a USB Ethernet dongle, a USB printer, and so on.

TinySniffer connection diagram
Connection diagra,

After configuring WiFi, the user can access the tinySniffer USB capture tool remotely by going to the https://www.usb7.net/ website and selecting My Devices. It will open a terminal window in your browser, and you’ll be able to capture packets with the sniff command


You can copy those to your computer and analyze them in Wireshark. Since it’s a software solution, I don’t think it captures all USB packets (including low-level ones), and the main advantage of the solution is remote access. More details can be found in the documentation.

YouTube video player

Note the tinySniffer runs the tinyDebian Linux distribution that we first noted in an article a NanoPi NEO Air SBC modified with a dual-band WiFi module from the same company. Neither tinyDebian OS nor the sniff command appears to be open-source so you can’t replicate this USB sniffer if you already own a NanoPi NEO Air board.

There’s a significant markup for the tinySniffer compared to the $23 asked for the NanoPi Air NEO as it’s sold for $199 on Tindie, a pricing similar to FPGA-based USB capture solutions.

Share this:
FacebookTwitterHacker NewsSlashdotRedditLinkedInPinterestFlipboardMeWeLineEmailShare

Support CNX Software! Donate via cryptocurrencies, become a Patron on Patreon, or purchase goods on Amazon or Aliexpress

ROCK 5 ITX RK3588 mini-ITX motherboard

6 Replies to “tinySniffer WiFi-connected USB sniffer is based on NanoPi NEO Air SBC”

  1. Lol trying to sell the open-source cloned solution as a product… I guess the license of the code doesn’t matter to some people.

  2. Please keep your facts straight.
    No company is not required to give you the sources if you are not a customer, not even under GPL. There is no law against selling GPL-ed software, especially in combination with selling hardware.

    There are 2 options the GPL works for you. Either software from your hand is being distributed or you obtained (bought) the product legally. If you are not the progammer or a customer the GPL is irrelevant. The GPL-sources must be distributed at cost, but:
    “You may copy and distribute verbatim copies of the Program’s source code as you receive it, …” (Clause 1 from GPLv2.)

    Most companies stay clear from this quagmire by selling “support” instead of “software”.

  3. usbmon + tcpdump does the trick for free in linux, and if you need to monitor USB in Windows, run a VirtualBox instance.

    Few scenarios where it’s not possible and it’s required a hardware solution.

Leave a Reply

Your email address will not be published. Required fields are marked *

Khadas VIM4 SBC
Khadas VIM4 SBC