Hi all,
My name is Avi and I am a rising senior Electrical Engineering student at
The Cooper Union who is interested in learning more about reverse
engineering USB devices!
I am attempting to read (download) a bunch of data from HOBOwares U30
logging device (http://www.onsetcomp.com/products/data-loggers/u30-nrc).
The device measures data from the (sold separately) 12-bit Temperature
sensor over a predefined time.
I have the software for the device and have tried sniffing the USB data
with USBlyzer (very hard to make any sense of the many URBs).
I know my device has 2 endpoints (numbered 81 and 02 for "in" and "out"
requests respectively) and it registers as a HID.
I have tried (via a python script on this page:
http://www.mattcutts.com/blog/playing-with-a-usb-missile-launcher/) sending
some control reads and dont know what to make of the responses I get.
Im not sure how to connect to/query the various endpoints and im scared to
write to the device (dont want to break it?)
Any advice for this noobie would be greatly appreciated!
Thanks,
Avi
------------------------------------------------------------------------------
Open source business process management suite built on Java and Eclipse
Turn processes into business applications with Bonita BPM Community Edition
Quickly connect people, data, and systems into organized workflows
Winner of BOSSIE, CODIE, OW2 and Gartner awards
http://p.sf.net/sfu/Bonitasoft
_______________________________________________
pyusb-users mailing list
pyusb-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/pyusb-users