How to profile the communication protocol of the Microsoft Arc wireless keyboard

reverse-engineeringwireless

I bought a new keyboard for windows, datasheet, and I would like to sniff the packets between the keyboard and the pc / USB transmitter.

The datasheet is useless and there is nothing informative for this purpose as I see it.

Firstly to see what protocol they use I have to see what is transmitted, I prefer not to open the keyboard and be in the middle between the computer and the keyboard.

I thought to build some RLC circuit around 2.4 Ghz and see the Voltage changes according to the keystrokes. Is there any smarter and better way to do it?

Best Answer

Of course you can capture the USB packets, although you'd probably find it more useful to capture the keystrokes (if your goal is to mimic what happens when a certain key of your keybard is pressed).

To capture network and usb traffic start with wireshark. It's a great tool to capture and analyse all network traffic.

Because you are interested in USB traffic you should attempt to do this. Note that it'll work only if you are running a windows session on a linux host.

Probably you are not, but i just thought i'd say.

Other options are also listed in wireshark site, and there are also paid tools (although with functional trial), for instance USBlyser, which would work in windows7, they say.

If you just need the keystrokes you could use this or some other software that allows you to record/view the key code received from the keyboard.

Good luck!