Sniff Me Web Service

Sniff Me Web Service


The Sniff Me web service is being developed to allow users to upload packet capture files of their own IoT devices to get a quick snapshot of whether unauthorised communications is occuring i.e. it has been compromised.

You can all about the idea behind the project over on our blog at  In order to start a service, we are eager to start profiling as many different devices as we can.  To do this, we're asking anybody and everybody who feels comfortable to capture and upload.

In doing this though, we do have a few rules to make the process a little easier:

  1. Capture file must be of .pcap format.
  2. Make sure cpatured device is signed out of all unnecessary services.
  3. DON'T use the device while you are capturing traffic.
  4. DON'T supply capture files for devices known or thought to have been compromised.
  5. Please state the following information about each device you capture:
    1. Manufacturer
    2. Make and Model
    3. Firmware and / or software version
    4. Purchase location (if known)
    5. Any extra information you feel is relevant
  6. Packet capture must be performed for at least 5 minutes and no more than 10 minutes.

We recomend you use something like wireshark to capture your traffic although any alternative will be ok.  Once you have a pcap file ready to go, use the form we have linked to at the bottom to submit your file.  If you have multiple files, please fill out the form for each file you have.


21 February 2017


Wireless, Public

About TSSec

We are Digger and Odskee, a small information security research team based in the UK.  We love breaking and fixing things and enjoy getting our hands dirty in the field of infoSec.

Odskee tends to focus on the theoretical, software based aspects while Digger finds himself at home with the raw electronics.  We both have a number of years of experience within a number of similar roles and think these work best as a team.

Latest News

©2019 TSSec