Bug ID |
9610
|
Summary |
USB: Add DFU dissector
|
Classification |
Unclassified
|
Product |
Wireshark
|
Version |
SVN
|
Hardware |
All
|
OS |
All
|
Status |
UNCONFIRMED
|
Severity |
Enhancement
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 12409 [details]
Example USB DFU by Ubertooth
Build Information:
wireshark 1.11.3 (SVN Rev Unknown from unknown)
Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.17, with Cairo 1.12.14, with Pango 1.30.0,
with
GLib 2.34.3, with libpcap, with libz 1.2.5, with POSIX capabilities (Linux),
with libnl 3, with SMI 0.4.8, with c-ares 1.7.5, without Lua, without Python,
with GnuTLS 2.8.5, with Gcrypt 1.4.4, with MIT Kerberos, without GeoIP, with
PortAudio V19-devel (built Jul 21 2012 10:51:55), without AirPcap.
Running on Linux 3.11.0+, without locale, with libpcap version
1.6.0-PRE-GIT_2013_12_28, with libz 1.2.5, GnuTLS 2.8.5, Gcrypt 1.4.4.
Built using gcc 4.8.0.
--
Hello,
Happy New Year (2014). It is great year to develop USB support in Wireshark (if
someone has a dream, I can implement it :))
I would like to start with USB DFU 1.1 dissector. Completed implementation is
provided by patch 3.
I am think about Export Object or Reassemble of blocks, but my Ubertooth (great
tool for DFU experiments) show me that is not easy (or someone can see the
clear beginning or end of that process?) - Ubertooth has two area to flash: 0
to 63 (Bootloader) and 64-x (firmware), so I assume devices can provide
specific configuration. See attached pcap.
You are receiving this mail because:
- You are watching all bug changes.