Friday July 22 we're organizing a workshop on reverse engineering
USB protocols of devices with proprietary protocols.
Reverse engineering protocols is fun! It's like a puzzle, and if there's
software out there that can solve the puzzle, your brain can do it too.
We'll be taking a look at reverse engineering the protocols on USB-connected
devices. Too many of these devices still come with windows drivers only, and
use an undocumented protocol. Figuring out those protocols is often a lot
easier than you might think, and so is writing a simple driver.
If you want to participate in this workshop, bring a Linux laptop,
preferably with a virtual machine with a Windows guest OS. If you have an
exotic USB device that only has a Windows driver, please bring that too.
This workshop will be given by Bert Vermeulen and Hans de Goede. Bert has
reverse engineered and written drivers for various USB logic analyzers for
sigrok: http://sigrok.org . Hans has reverse engineered and written drivers
for various USB webcams for the Linux kernel and for digital photoframes
19:00 Welcome, drinks
19:30 Start of the workshop Bert & Hans give a short intro on USB protocol
principles and a short demo of sniffing and interpreting usb traffic
20:15 Time to get your hands dirty, start reverse engineering your own USB
device, or one of the devices provided. Your hosts will be walking
around to answer questions and help you pass any speedbumps you
late: Time to go home?
really late: Chances are your hosts will want to go home at this time, hint
This workshop will be held in the hackerspace Revelation Space in The Hague:
Registration is not mandatory, but in order to have an idea of how many
people will be coming we kindly request you to send an email to
email@example.com if you're going to attend.