Skip to content
/ ccTools Public
forked from Baldanos/ccTools

Collection of tools used to interact with a ccTalk bus

Notifications You must be signed in to change notification settings

yaba/ccTools

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ccTools, a collection of tools to interact with a ccTalk bus

= Intro

ccTalk is a protocol designed to communicate with money-related devices like coin acceptors.
You can get more information about this at www.cctalk.org

= Tools

== ccSniff
ccSniff is meant to be used as a ccTalk bus sniffer. Just connect a UART (like a bus pirate) and start ccSniff.

Usage: ccSniff.py [options]

Options:
  -h, --help            show this help message and exit
  -i DEVICE, --interface=DEVICE
                        Serial port to use
  -w FILE, --write=FILE
                        File name to write data
  -b, --bus-pirate      Use this switch to tell the serial port is a bus
                        pirate

The ccTalk messages will be displayed in the console.


== ccParse
ccParse can read a data dump made by ccSniff to actually parse the data in a more comprehensive way.
Just launch ccParse with a dump file as a parameter.

ccParse uses the urwid library.

== ccJack
ccJack is used to hijack a ccTalk device on a bus. You will need a UART with both RX and TX connected to the but for it to work.
ccJack works by firstly listening for data, then learn responses made by the device to be hijacked. Then it sends out an "Address change" request to the device and starts to respond instead of the hijacked device.

Usage: ccJack.py [options]

Options:
  -h, --help            show this help message and exit
  -i DEVICE, --interface=DEVICE
                        Serial port to use
  -b, --bus-pirate      Use this switch to tell the serial port is a bus
                        pirate
  -s SOURCE, --source=SOURCE
                        Source address of the device to hijack
  -d DESTINATION, --destination=DESTINATION
                        Destination address of the device to hijack
  -t TIME, --time=TIME  Time to listen for packets
  -r FILE, --read=FILE  File to read responses from

You can optionaly provide a ccSniff capture file for ccJack to learn responses. As responses can sometimes change, it will always take the last responses it read on the bus.

== Teensy server
This file is meant to be used woth the arduino software and a Teensy device.
You will need to tweak the channelValue[] table to actually set how many credits (well, how many keystrokes) to send.

Just upload it to your Teensy, then connect the UART pins (look there for the correct pins http://www.pjrc.com/teensy/td_uart.html).

About

Collection of tools used to interact with a ccTalk bus

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published