
Unfortunately there is not much more that can be determined from the packets without reverse engineering the vendor protocol. This is the old method to get "USB device working without drivers". = Bits or bytes: Buffered Bytesįrom this you can basically tell that your device just uses HID to transfer Vendor data. However, after opening the capture in Wireshark 3.4.4, the dissection in "GET DESCRIPTOR Response HID Report" is as follows: HID Report USB HID dissector was improved during Google Summer of Code 2020, so in recent Wireshark versions you get better results than in older ones. I'll let y'all figure out where that puts me in this context. I can tell you what to use UDP for vs TCP, but don't ask me why or how they work. However, C++, Pascal, and ASM are mystery alien languages and if you ask me why the PNP/NPN transistor does what it does in the circuit I couldn't even begin to answer you - only that without it the circuit wouldn't work. I have 3 RPis, each one in a different project - soldered in. I run Arch Linux on my laptop, I know several languages including C#, Python, and the standard web trio (the PHP one). I'm really good with technology, but this is just escaping me.

Keep the lingo fairly simple please, however, because I have 0 experience in packets - network or USB. For reference purposes, y'all are welcome to view my capture file, but I'm not asking for a gimme - I want to learn how to understand and interpret this on my own. I'm trying to figure out how to read, interpret, and replicate communication with a "USB HID" device.

See CaptureSetup/USB for information on this. The current cvs version of libpcap (9 October 2006) supports sniffing from USB ports, at least for the Linux platform with the 2.6.9 and later kernels with the usbmon infrastructure.
