Intercepting packets from Electron App to keyboard in Linux – Digitalmunition




Home Forums Intercepting packets from Electron App to keyboard in Linux

This topic contains 0 replies, has 1 voice, and was last updated by  anonymous 1 month, 2 weeks ago.

  • Author
    Posts
  • #256906

    anonymous
    Participant

    I have a USB keyboard which has an Electron app to set the macros on the keyboard. I unpacked the Electron App, and the JS files seem to indicate it has been written in ReactJS, and is a minified production build, and obfuscated too much to reverse engineer.

    The second way to approach the problem seemed to be to use USB sniffer. I chose WireShark for the job. I wanted to capture all the data packets sent from the app to the keyboard, and hope to reverse engineer that. The problem is, I can’t find a way to capture the raw USB stream. I tried using WireShark to monitor usbmon0, but there is too much metadata, and separating the raw data from the protocol metadata seems to be a daunting task.

    Is there a simple way to capture all the raw data going from the app to the keyboard?

You must be logged in to reply to this topic.