8000 Reverse engeneering USB protocol (Redragon M711). · Issue #2 · dokutan/mouse_m908 · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
Reverse engeneering USB protocol (Redragon M711). #2
Open
@rolimans

Description

@rolimans

Hello, I'd like to the same you did, but with the model M711.
This is my first attempt reverse engineering something, so I'm having a hard time starting it.
After setting up the VM and Wireshark, I was able to capture some packets after changing values in the original software, but all packages were very small (average of 80 bytes) and were nothing like the dump found in your file "documentation/default-annotated".
Am I doing something wrong, or are the packages meant to be this size, and if so, how should I concat them to a better understending of the protocol.

Edit: just saw the README.md inside the documentation folder and it was very clarifying.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or requestquestionFurther information is requested

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      0