![]() ![]() This will capture the USB enumeration (more on USB enumeration can be found in chapter 4 here) packets that are used for proper packet dissection in Wireshark. Step 2 contains a really useful tip I omitted at first: after identifying the root hub you will sniff on, disconnect the device, start sniffing and then connect the device. Prepare I set up a capture process on a Windows machine as described on USBPcap’s website. I knew that it communicates through USB, so I had to reverse engineer the protocol… and that’s where the fun begun. To analyze captured packets I used, obviously, Wireshark. I had no other choice than to write an application myself, but in order to do that, I had to figure out how Arturia’s software and Microbrute communicate How?įirst of all, I needed a Windows machine (or a Windows running on a VirtualBox) with USBPcap installed and an Arturia’s Microbrute application. Arturia decided to release its software only for Windows and OS X, so as a Linux user I could not use my Microbrute to the fullest. Product itself is pretty great, but there was one problem. While ago I decided to buy myself a synthesizer. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |