2014-06-30 18:34 GMT-03:00 Avi Gadish <avigad...@gmail.com>: > Hi all, > > My name is Avi and I am a rising senior Electrical Engineering student at > The Cooper Union who is interested in learning more about reverse > engineering USB devices! > > I am attempting to read (download) a bunch of data from HOBOwares U30 > logging device (http://www.onsetcomp.com/products/data-loggers/u30-nrc). > > The device measures data from the (sold separately) 12-bit Temperature > sensor over a predefined time. > I have the software for the device and have tried sniffing the USB data with > USBlyzer (very hard to make any sense of the many URBs). > > I know my device has 2 endpoints (numbered 81 and 02 for "in" and "out" > requests respectively) and it registers as a HID. > > I have tried (via a python script on this page: > http://www.mattcutts.com/blog/playing-with-a-usb-missile-launcher/) sending > some control reads and dont know what to make of the responses I get. > > Im not sure how to connect to/query the various endpoints and im scared to > write to the device (dont want to break it?) >
We could expect that if there some dangerous input that could brick the device the firmware should filter it out, but who knows... > Any advice for this noobie would be greatly appreciated! I guess there is not much to say here, you have gone very far already. What you might do is try to find patterns on the data you sniff, that's what RE is about after all... -- Best Regards, Wander Lairson Costa ------------------------------------------------------------------------------ Open source business process management suite built on Java and Eclipse Turn processes into business applications with Bonita BPM Community Edition Quickly connect people, data, and systems into organized workflows Winner of BOSSIE, CODIE, OW2 and Gartner awards http://p.sf.net/sfu/Bonitasoft _______________________________________________ pyusb-users mailing list pyusb-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/pyusb-users