Reverse engeneering a Keyboard software
from Luffy879@lemmy.ml to linux@lemmy.ml on 28 May 06:13
https://lemmy.ml/post/30780004
from Luffy879@lemmy.ml to linux@lemmy.ml on 28 May 06:13
https://lemmy.ml/post/30780004
Im currently trying to get my Keyboards software to work on linux, but since that won‘t be a thing, like ever, im trying to Reverse engineer the software in order to copy the get and set requests the Software sends over USB and send them over a Python Script using libUSB, so I can control it independent of OS
So I set up my Wireshark with a USB snooper and started using the software
Only problem: Since I have no idea how a Keyboard usually communicates, so I have no idea what to look for. Can someone recommend me some already reverse engeneered FOSS Keyboard software as an example? (Like the wooting software, if its even OSS)
threaded - newest
I use ckb-next to make my RGB keyboard work on Linux. Maybe you can find some ideas by looking into that project
Unless the vendor is rolling something super custom, for the communication TO the keyboard, it should use USB HID.
Start Wireshark, filter for hid, connect the KB and the first message should be a HID descriptor of the KB, look for Output Reports (it’s meant from the POV of the usb master) or Feature Reports.
Though, this will probably not yield much insight - vendors love to do the easy thing, reserve opaque 32x8 bytes as a “downlink” Output communication in the Vendor Usage Page and stuff their own protocol/encoding in there.
On linux I can recommend hid-tools for working with this, in windows I believe your only solution is Wireshark.
www.marcusfolkesson.se/…/hid-report-descriptors/
Happy Hacking!
E: About the already reversed software, for logitech (and more) stuff, there is piper but you will want to look into the underlying daemon libratbag, there is also solaar
I reversed engineered a keyboard for a presentation in uni. I’ll drop you an excerpt of a written review:
Feel free to ask as needed here. Spam the requests on the software while monitoring wireshark to be sure of what is what.
The other large comment by “taaz” is also very useful and parts of which I did use while reverse engineering.
for a more low-level discussion for fundamentals, Ben Eater has 5 videos going over PS/2 keyboards and then USB keyboards. Here is the first video: www.youtube.com/watch?v=7aXbh9VUB3U
Nope. That’s not how that word works.
What keyboard? There is a small chance you can rip out the chip and replace it with a teensy running qmk. That will allow you to get it to work and be able to config it in Linux.
Not sure if it’s more or less work that RE’ing the communication, but it will require soldering