Re: Reverse Engineering a USB device

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Feb 23, 2009 at 11:34:54AM -0500, Ron Gage wrote:
> Greetings
>
> I have in my greedy little hands a USB based system locking device
> called a XyLoc (from a company called Ensure Technology - they
> supposedly have a partnership with Novell if that helps at all -
> http://www.ensuretech.com/mirror/company/partnering/solutionpartners.html).
> They (of course) do not provide any Linux support and I would like to
> change that by reverse engineering the USB protocol of the device and
> writing a driver for it.  Yes, I know - a lot of work.  I've done
> similar things before (though with Ethernet and not USB).
>
> Are you aware of any resources or guides for reverse engineering a USB
> protocol?  I have a Windows machine and will be utilizing USB-Snoopy to
> capture the wire communications.

That's generally the best way to do this (or you can use vmware and
monitor the usb stream from Linux underneath Windows, using usbmon.)

> I've done this in the past for this device and ran into multiple road
> blocks including a supposedly windows-only packet type that this
> device appeared (at the time) to rely on extensively.

What do you mean by a "windows-only packet type"?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Media]     [Linux Input]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Old Linux USB Devel Archive]

  Powered by Linux