

Mac OS has a virtual port that can be used to examine USB traffic. Setting Filters In Wireshark: You can home in on the traffic of interest by setting a filter which you edit directly at tab9, here we have set up a simple filter to capture all data going to bacnet ID 3, ‘mstp.dst 0x03’ is the syntax.

NB: As of MacOS 10.15.1 Catalina it is no longer possible to activate the virtual USB interface XHC20 using the method described below, although it appears it might be possible if you first disable System Integrity Protection as described here: Enable USB Port Monitoring These instructions are for sniffing USB data using Wireshark on Mac OS, but the process should be similar under Linux and Windows. I was trying to reverse engineer the protocol used to communicate with a 3D printer and was thinking about hooking up an oscilloscope when I discovered that USB traffic can be captured and analyzed by Wireshark (which I had thought was only for network traffic).
