aboutsummaryrefslogtreecommitdiffstats
path: root/captures/README.md
blob: fa8ed0fed1816246c9f3ee55cf885a5a3d354667 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
# T-937/M Serial Captures

These are Wireshark capture files of the oven communicating with its control application.
The data has been captured as USB packet traces using CH341 and PL2303 USB-to-Serial adapters.
You probably want to load the Wireshark dissectors from the dissector directory to look at it:

    wireshark -Xlua_script:ch340.lua,pl2303.lua,t937.lua

## Capturing USB-to-Serial communications on Windows

- install Wireshark with USBPcap
  - make sure you [have `USBPcapCMD.exe` in your extcap directory][usbpcapcmd]
- set up capture options
  - disable "Capture from all devices connected"
  - disable "Capture from newly connected devices"
  - enable Inject already connected devices' descriptors..."
  - enable only the USB-to-Serial device
- start capturing
- connect from Pb-Free.exe

You can also read [my blog post][blog] for more information about this.

[usbpcapcmd]: https://desowin.org/usbpcap/tour.html
[blog]: http://mmm.s-ol.nu/blog/reversing-serial/