
> Here is the raw USB capture for this packet (according to SnoopyPro) > much time in the past, so I thought I would toss this over the fence: > The development team and the helpful users here have helped and saved me > 3) How did I screw up on the byte size of my hand dissection? (highlighted > a few relevant bytes of data and many many empty (0x00 bytes) > 2) What is in the Ethernet header/wrapper where it seems there are only > Tyson seems to suggest or something more perplexing? > 1) What is the traffic inbetween real ethernet packets.

> run into proprietary protocols and you can't get your hands on any > I am trying to understand as much through "reverse engineering" before I > looking at this I'll certainly understand. > scope of things here, so if nobody knows or doesn't want to spend the time > I have a couple questions, I understand this might be outside the normal > then I tried to hand dissect the snoopypro packet based on what I could > Well I found a packet to packet correlation between the two sniffers and > Just in case someone is as interested as me, I meant to attach these files:

Usbsnoopy compatible with libpcap and write libpcap files. May want to ping the snoopypro people and ask them if they can make Usbmon in linux uses to write wireshark compatible pcap files, you Since libpcap now has an encapsulation type for USB frames which TCPdump (download and install the latest tcpdump/libpcap svc version)Īnd also recompile your linux kernel so that it provides a pcap-likeĭescribes what you need to do to capture the usb frames on linux. To be able to capture the USB layer on linux you need a new version of

You must make it capture traffic on a much lower layer. To get something similar to what snoopy captured from your linux box Thats why there is no real relation between what Wireshark saw on

Wireshark you captured packets all the way up in the Ethernet layer. With snoopy you captures tiny frames in the Lower USB layer and with The Ethernet frames running on the virtual link layer provided by USB. With wireshark on Linux you were capturing not USB frames but rather So with SnoopyPro you are capturing USB frames. When used for EthernetOverUSB several layers above the USB layer is SnoopyPro is a USB capture tool and it captures the various layers of I think you are comparing apples to oranges here.
