I have a Windows-based network security appliance that has an embedded 2x40 LCD 
+ jog dial for displaying status info and controlling various functions 
(network configuration, reboot/shutdown, etc) using a helper program running on 
the OS. It presents itself as a USB HID device (labeled “Keyboard + LCD”) and 
uses a custom Windows-only driver. There is no documentation whatsoever.

What I’d like to do is gather information on how this device communicates with 
the OS in order to add support for it under BSD & Linux. I’m currently using 
USBlyzer and it works well, but it’s a Windows-only program and only exports 
captures in its own format.

What’s the best way to capture USB traffic on Windows so that it can later be 
viewed & analyzed on a *nix system? So far Wireshark + USBpcap seems like the 
best solution but I’m wondering if there’s a better way…

Thanks,
Pavel

----------------
[email protected] (Email/XMPP)
https://kirkovsky.com

OTR Fingerprint: 0DC94FB7 CF0F6989 E2746A37 0EADCF54 00145E35
Key fingerprint: 4328CFD67B46A8FB32270F4F0CE4A0B83F3FC81F
Public Key: https://kirkovsky.com/[email protected]
Public Key (PKA): `gpg --auto-key-locate pka -ea -r [email protected]`
Public Key (Github): https://gist.github.com/pkirkovsky/01071907297b34829249

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
dorkbotpdx-blabber mailing list
[email protected]
http://music.columbia.edu/mailman/listinfo/dorkbotpdx-blabber

Reply via email to