[BLE--HID] usb hid device category definitionBrief Introduction
HID devices are human-computer interaction devices. Common devices include the mouse, keyboard, and game handle. Generally, the wired connection is connected to the machine device through a USB connection, which serves as the user input device. In bluetooth technology, access to
Because the system has its own hid driver, it eliminates the need for upper-computer driver development. For some simple devices, this is a very classic implementation solution. This article involves a lot of content, from the development of lower-computer hid devices to the Development of upper-computer application software.Starting from the AVR-HID, The AVR-
ArticleDirectory
About
What does the API look like?
License
Download
Build instructions
Contact
About
Hidapi is a multi-platform library which allows an application to interface with USB and Bluetooth hid-class devices on Windows, Linux, and Mac OS X. while it can be used to communicate with standard hid devices like keyboards, mice, and joysticks, it is most useful when used
network cable for broadband dialing)
A hid attack tool (roast goose or Badusb)
FTPserver (build an FTP server to receive stolen files)
PHPstudy (set up an http server to store ps scripts, etc)
7z.exe/7z. dll (stored on the http server and then compressed and uploaded to reduce the upload speed as much as possible)
Code Section 0 × 04 (the following code may be offensive and should not be used for illegal p
I recently studied the Bluetooth keyboard and mouse, so I took a rough look at the Linux HID framework.HID Bus
The HID bus is initialized in the hid-init of the hid-core.c:
Bus_register ( hid_bus_type );
Definition of hid_bus_type:
Static struct bus_type hid_bus_type = {
. Name = "
This article introduces the kernel section of Bluetooth protocol stack bluez which implements the hid function in Linux.
In Linux kernel, the implementation code of bluez for HID is in the/NET/Bluetooth/hidp folder, which includes three files: sock. C, core. C, and hidp. h. Bluez provides a socket interface by which user space programs control hid. The Protocol n
Document directory
2.1 btd_register_adapter_driver
2.2 btd_register_device_driver
This article analyzes the implementation of the hid protocol in the Bluetooth bluez protocol stack.1. Basic Concepts
The hid protocol is used for human-machine input devices. The implementation code of hid in bluez is in the input directory under its root directory. The Blueto
Analysis of usb hid device interface protocol using ollydbg
Author: tase tase@163.com
Keywords: ollydbg, USB, hid, bus hound,
Analysis tools: ollydbg, bus houndAnalysis object: a USB interface Flight Simulator
Objective: To analyze the software that uses the usb hid device, "buckle" the data protocol of the HID device
BrieflyUSB protocol is widely used in the computer, when the external USB device is plugged in, it will be detected and initialized and started, and then follow the USB protocol to transmit data, supply is used for acquisition.USB devices are so diverse that they are divided into different device classes (Devices Class), and HID (Human Interface device class, man-machine interface) is a particularly important category. There are, of course, many other
Usb-hid is the abbreviation of human Interface device, which belongs to the Human-computer interaction operation device, such as USB mouse, USB keyboard, USB game joystick, USB touchpad, USB trackball, telephone dialing device, VCR remote control and so On. Tpyboard with Micropython In addition to the USB host feature, It can also be applied as a Usb-hid device, which focuses on if used as a mouse and Keybo
In USB, USB Host identifies a device through various descriptors, including device descriptors, configuration descriptors, interface descriptors, endpoint descriptors, string descriptors, and report descriptors. The USB report descriptor is a descriptor in the HID device. It is a complicated descriptor.
USB hid devices transmit data through reports, including input reports and output reports. The input r
TEENSY practices for HID attacks
Overview
Traditionally, when you insert a CD/DVD in your computer or a USB device, you can run a file containing malicious content through automatic playback, however, when the automatic playback function is disabled, autorun. the inf file cannot be automatically executed. However, with TEENSY, you can simulate a keyboard and mouse. When you insert this custom USB device, the computer will recognize it as a keyboard,
1. When the host computer writes data to HID, the first byte transmitted by each packet is the write Data (out)of the report ID, and the upper and lower machine must be identical .
Host Computer Configuration location:
Next machine configuration location:
2. HID up-level machine when the data is returned, the first byte of each packet must also be read Data (in)the report ID, and in the lower machine,
In USB, the USB Host identifies the device by using various descriptors, including the device descriptor,Configuration descriptor, interface descriptor, endpoint descriptor, string descriptor, report descriptor, and so on.The USB report descriptor is a descriptor in the HID device, which is a comparisonA complex descriptor.USB hid devices transmit data through reports, including input reports and output rep
Discussion: http://www.ednchina.com/blog/computer00/14382/category.aspx
In USB, the usb host identifies the device by using various descriptors, including the device descriptor,Configuration descriptor, interface descriptor, endpoint descriptor, string descriptor, report descriptor, and so on.The USB Report Descriptor is a Descriptor in the HID device, which is a comparisonA complex descriptor.
Usb hid dev
,//File attributesUINT hTemplateFile//handle to template file);Reading device files[DllImport ("Kernel32.dll", SetLastError = True)]private static extern bool ReadFile(INTPTR hfile,byte [] lpbuffer,UINT nNumberOfBytesToRead,Ref UINT Lpnumberofbytesread,IntPtr lpoverlapped);Release device[DllImport ("Hid.dll")]static public extern bool Hidd_freepreparseddata (ref INTPTR preparseddata);Turn off access to device handles, and when you end the process, add
1. Modification of descriptors:
1.1 Configuration Descriptor Modification:
Modifies the size of the HID report Descriptor's bytes in the HID descriptor under the configuration descriptor. Modify the value to the number of bytes written by the HID report descriptor.
1.2 Specifies the endpoint, type (input, output), and data length of the endpoint used in the end
Front-end time to tinker with a HID hardware, need and Android communication, online search a lap, harvest is not small.The better articles are:Android USB host with HID communicationAndroid service creates USB host communicationWhere the code is to be noted in some places, please note:/*** USB HOST connection HID *@authorIVAN **/ Public classMainactivityextendsA
Download hid SPEC:Http://www.usb.org/developers/hidpage#Class_DefinitionsDownload hid Usage Table
Http://www.usb.org/developers/hidpage#HID_Usage
The hid specification of the mouse device and host. Each time the transmission is interrupted, the Mouse sends four bytes of data to the PC. The meaning is as follows:
Data [0] -- | -- bit7: 1 indicates that the variati
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.