Hi there, as a new registered Wiki user, I cannot add text to the CaptureSetup/USB wiki page. The page is protected against editing by normal users.
https://wiki.wireshark.org/CaptureSetup/USB So I hope this is the right place to suggest two additions to that page. It would be very helpful to have these added, since when I looked for similar information, I didn't find a MITM hardware solution, but almost every advice was to sniff USB traffic on the OS itself or using a virtual machine. Both cannot be done when the USB host cannot be accessed, e.g. a PS4. The following two diy-hardware devices can be inserted on a cable between a USB device and a USB host - and they are much cheaper than commercial products I found. I tested SerialUSB and it works fine with Wireshark. I didn't try USBProxy due to lack of a BB. ----------------------------------------------------------------------- USB traffic MITM with Linux If you can't intercept USB traffic on the host, e.g. a game console, there are projects that facilitate building a simple MITM sniffing device. SerialUSB by Mathieu Laurendeau https://blog.gimx.fr/serialusb/ https://github.com/matlo/serialusb is designed to intercept USB HID traffic. Originally made for the GIMX project, which aims to convert PC game controller USB messages for the PS4. You will need a Linux computer to capture the HID messages and an Arduino-based USB dongle. Parts are cheap. If you don't like soldering, some enthusiasts sell ready-made "GIMX USB adapters" on eBay and elsewhere. USBProxy by Dominic Spill https://github.com/dominicgs/USBProxy intercepts USB traffic with a Beaglebone Black, which is reconfigured to act as a USB gadget emulating the device connected to the 2nd USB port. According to the documentation, it allows sniffing non-HID traffic, as well. ___________________________________________________________________________ Sent via: Wireshark-dev mailing list <wireshark-dev@wireshark.org> Archives: https://www.wireshark.org/lists/wireshark-dev Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe