hi
I am reverse engineering a USB device that only works on Windows XP; the idea is to understand the protocol for creating a Linux program (C-only).
The USB talks via Endpoint, a number representing a source and sink for data, the device I am hacking talks to three different
Endpoints, and it's a USB2 device, which also uses {
control,
Bulk } types of transfer mechanisms, each with varying characteristics.
The
Isochronous transfer mechanism is not used, I need the USB sniffer to show this information clearly.
Packet# EndPoint transfer_mechanisms data_len data (hex)
I am currently using the program
Sniffbin-v1.8, which is good on
Windows-XP, but not exactly handy to be used.
I'm slowly making things work, the program is already able to correctly initialize the device - which hey? It's "
first things first: wiggle your big toe, start small and work your way up!" (quote, "Kill Bill" movie) - but the current USB-Sniffer is making things uncomfortable -
s there anything better, guys? a want a better and sharper sword