https://github.com/53845714nf/reverse_engineering_kvm_switch
A document of the Reverse Engineering KVM Switch Signal. This was part of the third semester Computer Science in the subject Operating Systems and Computer Networks.
https://github.com/53845714nf/reverse_engineering_kvm_switch
latex-document python3 reverse-engineering usb wireshark
Last synced: 12 months ago
JSON representation
A document of the Reverse Engineering KVM Switch Signal. This was part of the third semester Computer Science in the subject Operating Systems and Computer Networks.
- Host: GitHub
- URL: https://github.com/53845714nf/reverse_engineering_kvm_switch
- Owner: 53845714nF
- License: gpl-3.0
- Archived: true
- Created: 2023-02-27T23:12:01.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2024-02-10T14:24:07.000Z (about 2 years ago)
- Last Synced: 2025-02-15T19:38:14.402Z (about 1 year ago)
- Topics: latex-document, python3, reverse-engineering, usb, wireshark
- Language: TeX
- Homepage:
- Size: 337 KB
- Stars: 3
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Reverse Engineering KVM Switch
This is a LaTeX document detailing the process of reverse engineering the USB signal of a KVM switch using Wireshark and Python.
## Team Members
- [Matthias Enderlein](https://github.com/programming-matthias)
- [Sebastian Feustel](https://github.com/53845714nF)
## Background
Our team was tasked with reverse engineering the USB signal of a KVM switch.
To ensure that the software signal also works under Ubuntu Linux.
## Methodology
We used Wireshark to capture USB packets sent between the KVM switch and a connected computer. We then analyzed the captured packets to identify patterns and gain insights into the USB signal.
Using Python, we wrote scripts to use this USB signal on Linux Computers.
## Results
Our analysis of the recorded packets showed that the KVM switch uses a different signal to switch between the computer inputs. And the computer can determine the state of the switch.
## Conclusion
Reverse engineering the USB signal of a KVM switch using Wireshark and Python was a challenging but rewarding process. Our findings have the potential to help others.