USB capture on your PC is usually good enough for the common uses of reverse engineering USB devices or troubleshooting code running on a USB device microcontroller.īut Wireshark using your PC’s USB port can’t help if the communication is between a USB device and some USB host other that your PC. Posted in Misc Hacks Tagged usb Post navigation Meanwhile, if you’re whipping up your own useful debug tools, don’t hesitate to drop us a line! We’ve seen some other similar hardware before. Once assembled, you can program the chips via USB, with no external hardware programmer required. Gerber files are available and the required components can be bought off the shelf. If you need this tool, spinning up your own is straightforward. In addition to live sniffing, it also allows captured data to be saved for later analysis. Most commonly used for network packet sniffing, Wireshark can also be used with a wide variety of other capture hardware for other debugging tasks, as seen here. The device is built specifically for use with Wireshark. This setup is capable of operating at data rates of up to 40-50 MB/s, more than enough to debug the vast majority of USB peripherals on the market. To sniff high-speed USB communications, the device relies on a Lattice LCMXO2 FPGA and a Cypress CY7C68013A microcontroller, paired with a Microchip USB3343 USB PHY. Sometimes, it’s the only way to properly understand what’s going on. If you’ve done any development on USB hardware, you’ve probably wished you could peek at the bits and bytes as they pass through the data lines.
0 Comments
Leave a Reply. |