I reversed engineered a keyboard for a presentation in uni. I’ll drop you an excerpt of a written review:
Resources used
I learned the USB protocol from this (the relevant parts I needed). We’re thinking of including some basic understanding of the USB protocol in the slides.
https://www.beyondlogic.org/usbnutshell/usb6.shtml
I got an idea of what could be going on from the following link, specifically the section I’ve set.
https://github.com/openrazer/openrazer/wiki/Reverse-Engineering-USB-Protocol#phase-4—decoding-the-protocol
I deciphered the protocol using the USBHID packets that would be sent. I was highly sure it was USBHID from a pointer from another Linux community member, but this article was my third source to confirming this.
https://hackaday.com/2020/04/14/reverse-engineering-an-rgb-keyboard-under-linux/
One of the sources for information to develop these procedures was from the openRGB wiki.
This stream has to do with reversing using URB. I find this might be out of scope, and it would’ve been way tougher to reverse engineer with this.
Feel free to ask as needed here. Spam the requests on the software while monitoring wireshark to be sure of what is what.
The other large comment by “taaz” is also very useful and parts of which I did use while reverse engineering.
I reversed engineered a keyboard for a presentation in uni. I’ll drop you an excerpt of a written review:
Feel free to ask as needed here. Spam the requests on the software while monitoring wireshark to be sure of what is what.
The other large comment by “taaz” is also very useful and parts of which I did use while reverse engineering.