The tool is for parsing the received lora packet.
I seperated the MIC and header part from the received packet. I am trying to decrypt the payload part using aes-counter-decrypt, where i am getting gibberish.
I developed a sniffer code in arduino for lora packets. The radiohead library truncates first 4 header bytes, so I was not able to decode it properly. I changed the library code and now its working fine.
@Akarsh25@bconway@Anh_Quan_Tong
I am trying to do a similar thing if you can help me please. I want to forward packets from gateway bridge to external MQTT server, and then decrypt messages there, knowing that OTAA is used. If that is possible, how to decrypt the packets and hence the payload? and how to get the nwkSkey and appSkey at the external end while they are not generated from the beginning?