USB protocol reverse engineering workshop
Friday July 22 we're organizing a workshop on reverse engineering
USB protocols of devices with proprietary protocols.
Reverse engineering protocols is fun! It's like a puzzle, and if there's
software out there that can solve the puzzle, your brain can do it too.
We'll be taking a look at reverse engineering the protocols on USB-connected
devices. Too many of these devices still come with windows drivers only, and
use an undocumented protocol. Figuring out those protocols is often a lot
easier than you might think, and so is writing a simple driver.
If you want to participate in this workshop, bring a Linux laptop,
preferably with a virtual machine with a Windows guest OS. If you have an
exotic USB device that only has a Windows driver, please bring that too.
This workshop will be given by Bert Vermeulen and Hans de Goede. Bert has
reverse engineered and written drivers for various USB logic analyzers for
sigrok: http://sigrok.org . Hans has reverse engineered and written drivers
for various USB webcams for the Linux kernel and for digital photoframes
- 19:00: Welcome, drinks
- 19:30: Start of the workshop Bert & Hans give a short intro on USB protocol principles and a short demo of sniffing and interpreting usb traffic
- 20:15: Time to get your hands dirty, start reverse engineering your own USB device, or one of the devices provided. Your hosts will be walking around to answer questions and help you pass any speedbumps you encounter.
- late: Time to go home?
- really late: Chances are your hosts will want to go home at this time, hint hint.
Registration is not mandatory, but in order to have an idea of how many people will be coming we kindly request you to send an email to firstname.lastname@example.org if you're going to attend. -- Main.HansDeGoede - 23 Jun 2011