Last active
June 24, 2022 15:33
-
-
Save 0xdevalias/7653219 to your computer and use it in GitHub Desktop.
Notes on USB packet capturing/interfacing/reverse engineering.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Researched By: Glenn 'devalias' Grant (http://devalias.net) | |
# License: The MIT License (MIT) - Copyright (c) 2013 Glenn 'devalias' Grant (see http://choosealicense.com/licenses/mit/ for full license text) | |
USB Complete : The Developer's Guide, Fourth Edition, Jan Axelson | |
* http://www.lvr.com/usbc.htm | |
* http://www.amazon.com/USB-Complete-Developers-Guide-Guides/dp/1931448086 | |
* https://itunes.apple.com/au/book/usb-complete-fourth-edition/id482722029?mt=11 | |
http://learn.adafruit.com/hacking-the-kinect | |
http://reverseengineering.stackexchange.com/questions/2416/how-to-reverse-engineer-simple-usb-device-windows-linux | |
* http://www.mattcutts.com/blog/reverse-engineering-a-windows-usb-driver/ | |
* http://www.beyondlogic.org/usbnutshell/usb4.shtml | |
* http://www.beyondlogic.org/usbnutshell/usb6.shtml | |
* https://today.java.net/pub/a/today/2006/07/06/java-and-usb.html | |
* http://www.mattcutts.com/blog/playing-with-a-usb-missile-launcher/ | |
* http://www.mattcutts.com/blog/linux-usb-device-driver-info/ | |
* http://www.mattcutts.com/blog/compile-a-simple-usb-program-in-linux/ | |
USB Vendor ID | |
* http://www.linux-usb.org/usb.ids | |
* http://usb-ids.gowdy.us/read/UD/ | |
* VID | |
* VID_0738 = Madcatz | |
* HKEY_CURRENT_USER\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_0738&PID_1109 | |
USBPcap - USB Packet capture for Windows | |
* http://desowin.org/usbpcap/ | |
* https://github.com/desowin/usbpcap | |
http://labs.vmware.com/flings/virtualusb | |
http://vusb-analyzer.sourceforge.net/ | |
* VMWare .vmx config settings | |
* monitor = "debug" | |
* usb.analyzer.enable = TRUE | |
* usb.analyzer.maxLine = <number of 16-byte lines> | |
* mouse.vusb.enable = FALSE | |
http://benoit.papillault.free.fr/usbsnoop/ | |
http://www.wireshark.org/download.html | |
* http://wiki.wireshark.org/Tools | |
* http://wiki.wireshark.org/CaptureSetup/USB | |
http://www.sysnucleus.com/usbtrace_download_x64.html | |
http://www.hhdsoftware.com/usb-monitor | |
http://www.reddit.com/r/ReverseEngineering/comments/1nmfhz/usb_analyzer_for_mac/ | |
* http://www.totalphase.com/products/beagle_usb12/ | |
* http://www.totalphase.com/products/beagle_usb480/ | |
* http://labs.vmware.com/flings/virtualusb | |
* /Developer/Applications/Utilities/USB Prober.app |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment