利用SOC+LINUX截取USB数据(和电脑软件截取类似)

    本文地址:http://tongxinmao.com/Article/Detail/id/355

    BeagleBoard/GSoC/2010 Projects/USBSniffer

     USB sniffing project using the BeagleBoard-xM. It builds on the Google Summer of Code project from 2010 that used the non-xM version of the hardware to build a pass through USB sniffer. [Matlo] couldn’t get it to work back then, but recently revisited the project. He’s cleaned up some scripts and generally made it a bit easier for others to pull off as well.


    The ARM-based BeagleBoard seen above acts as man-in-the-middle. You connect your target USB device to the board and the board to a computer. The board emulates the target device, passing packets in either direction while also logging them. The captured data is in the correct format for display using WireShark, the de facto standard for making sense of captured communication packets.



    https://github.com/matlo/bb_usb_sniffer

    https://www.elinux.org/BeagleBoard/GSoC/2010_Projects/USBSniffer



    MUSB:

    http://processors.wiki.ti.com/index.php/MUSB_Linux_Driver_Configuration


    上一篇:USB的29种攻击方式
    下一篇:OPOS驱动及应用