This is a USB keyboard emulation device, so when you swipe a card, the data on tracks 1 and 2 are typed on the screen into whatever program you have open at the time. No worries I figured, this will make hacking at it that much more fun. Last edited by lazlow; at The configuration name and the module name are listed: I’ve been on Google for a while now but I’m not sure if any of the card readers I find will work with Linux. I didn’t find any instructions that were as straightforward as they should be, so Linux – Hardware This forum is for Hardware issues.

Uploader: Mikazshura
Date Added: 19 April 2005
File Size: 44.89 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 30367
Price: Free* [*Free Regsitration Required]

Magtek makes several models that do this. Want to know if that peripheral is compatible with Linux? I’ve been on Google for a while now but I’m not sure if any of the carx readers I find will work with Linux. Review your favorite Linux distribution.

Python Device Hacking Keyboard. Reports contain data from one or more items. The default terminal is the login screen and every swipe of a credit card posts the content of the mag strip to the login screen.


To do this, I use usbmon: Okay, thank you very much. Now, the question of which slot on the reader corresponds to which device file.

It should work with any 2. For Linux use you want to use a USB interface reader which emulates a keyboard. I scrapped together this example using python-evdev. The PDF above gave me a keycode map which made complete sense on the above output see snippet below:.

Linux Kernel & Device Driver Programming

To do this, I use usbmon:. Email Required, but never shown. The first byte is telling you which modifier keys are set.

Shantanu Gautam Previous Semesters Please see the archived project site here. Sign up using Facebook. The version of the manual you referenced has been removed. Context Sensitive File System: The following bytes are telling you which keys are pressed.

Linux compatible flash card reader. How should I go about reverse engineering this device? I did figure out the results by comparing onscreen output to my PyUSB output:. Restoring Defaults Run the program and then enter the following commands: Thank you for your article. Repeat for each kind of card you actually have.


It would nice if you could update your answer with some of this information. Sean Easton and Bobby Roy For our project, we wanted to edit the Linux kernel boot process to require that a user, as part of the authentication process, insert a uniquely-keyed USB device.

Do you have any advice on how to capture the output without it writing to the default terminal as well. Sign up using Email and Password.

Reverse engineering a USB magstripe card reader – Reverse Engineering Stack Exchange

With this information confirmed I figured I would approach it with the same method used in one my older post Python Device Hacking Keyboard. I’m trying to learn about USB reverse engineering, so I’m trying to understand how this device sends data to my computer. The former involves install a device with a Windows driver HID driveror as a keyboard alternative.