Hacker News new | past | comments | ask | show | jobs | submit login

That is my question as well. I've always been interested on the binary blobs that go to HID moce and keyboards. I wonder if this would make cracking those any easier?



I've had a lot of luck capturing USB packets using a Windows virtual machine and Wireshark on a Linux host. Most recently I've used this to reverse engineer the configuration protocol of the Pulsar X2 v2 Mini gaming mouse.

I've also used this to capture the firmware update flow for the gamepad on a GPD Win 2. A physical sniffer wouldn't be ideal here since the gamepad - while USB - is embedded within the device.


What is the result and use of that god win 2. Got one of those and any particular interesting points one can share?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: