hashbang / darkwing

A covert pentesting platform embedded inside a USB Cable.
MIT License
5 stars 3 forks source link

Device reverse engineering (via packet sniffing/logging) #8

Open RyanSquared opened 6 years ago

RyanSquared commented 6 years ago

Tracker issue for feature

Will likely require further documentation as I didn't really understand it on first look.

swedishhat commented 6 years ago

I'm helping @lrvick do some of the hardware / firmware side of this. So as I understand it, the device won't need to reverse any packets. Architecturally, there will be an MCU with two USB FS peripherals (or one FS and one HS, I forget). One peripheral will serve as a USB host and one will serve as a USB device. A keyboard (or anything, really) would attach to the MCU host side and the MCU will make note of it's VID and PID. The MCU will then use the other USB peripheral to enumerate itself as a USB device with the same VID and PID to the host computer. It will then relay the USB packets back and forth with the ability to log all traffic and inject its own.

I'm thinking it would probably help to have a flow chart or some other sort of system diagram to describe this.

RyanSquared commented 6 years ago

My bad, I misnamed it. Updated in issue topic to better represent feature.

lrvick commented 6 years ago

There is no device reverse engineering to do at all as far as I understand it.

We are the ones designing the device, against well defined public specs.