Home

Awesome

tuyadump (experimental)

Tool to dump communication with tuya devices

Warning

This tool has been developped while coding a GO API to control Tuya devices (Available here)[https://github.com/py60800/tuya].

Despite being the result of quick and dirty coding, I found it great for debugging tuya communication.

As of now, only version "3.1" protocol is supported

New : 3.3 protocol is supported but you have to select an alternate branch : "3.3-Support" (still experimental too).

Prerequisites

Get the keys and ids of the tuya devices : https://github.com/codetheweb/tuyapi/blob/master/docs/SETUP.md

Acknowledgements

@codetheweb for reverse engineering tuya protocol

@google team for providing gopacket libraries

and many others...

Get and build (Linux)

Install libpcap dev package (i.e. sudo apt install libpcap<version>dev)

Get gopacket library:

go get "github.com/google/gopacket"

Get this library

go get "github.com/py60800/tuyadump"

Build:

go build tuyadump.go comm-msg.go crypto.go dodump.godebug.go

Run

Create a config file with the keys and id collected from tuya device (check example config for format)

To view traffic in real time sudo tuyadump -C tuyaconfig.jsonport 6668

To view trafic collected with tcpdump: tuyadump -C tuyaconfig.json -r dump.pcap