usb-tools / USBProxy-legacy

A proxy for USB devices, libUSB and gadgetFS - this project is unmaintained, try here: https://github.com/usb-tools/Facedancer
GNU General Public License v2.0
442 stars 104 forks source link

FYI: Link added to Wireshark Wiki #74

Closed hzulla closed 6 years ago

hzulla commented 6 years ago

Hi there,

thanks for your project. It took me a very long time to actually find it, despite googling various iterations of my problem.

I didn't end up using USBProxy, but it helped me find its cousin SerialUSB which ended being the right tool for my problem.

To make things easier for others, I have asked to add the following text to the Wireshark Wiki. Please let me know if you agree with this description of your project. Also, as I didn't actually use USBProxy, please let me know if the description is correct.

MITM hardware with Linux

If the USB host is a black-box device such as a game console and you cannot capture USB traffic on the host's operating system, here are two diy-projects that help you build a simple MITM device to sniff USB messages on the USB cable.

SerialUSB is designed to intercept USB HID traffic. Originally made for the GIMX project (which lets you connect PC game controllers to the PS4 by converting the HID protocol messages). You will need a Linux computer to capture the HID messages and an Arduino-based USB dongle. Parts are cheap. If you don't like soldering, you can buy ready-made "GIMX USB adapters" from the developer and from enthusiasts on eBay and elsewhere.

USBProxy intercepts USB traffic with a Beaglebone Black, which is reconfigured to act as a USB gadget emulating the device connected to the 2nd USB port. According to the documentation, it allows sniffing non-HID traffic, as well.

dominicgs commented 6 years ago

Looks good to me

hzulla commented 6 years ago

Thank you. If you're unhappy with anything, I will gladly change the text for you. Thanks again for your project, it was very eye-opening and helpful.