miércoles, 18 de septiembre de 2013

Chromecast Hacking

Chromecast testing has revealed that it is a DIAL device and sniffing shows several interesting commands that can be sent to it.
The chromecast dongle is apparently listening on http port 8008. (Also port 9080 while Netflix app is running)
Some control can be established by sending simple HTTP GET’s, POST’s and DELETE’s.
** For these examples the youtube app is running, also available are Netflix, ChromeCast, and GoogleMusic.
get device information xml:
curl http://10.0.1.2:8008/ssdp/device-desc.xml
get detailed device information json:
curl http://10.0.1.2:8008/setup/eureka_info?options=detail
scan for available wifi:
curl http://10.0.1.2:8008/setup/scan_results
get supported time zones:
curl http://10.0.1.2:8008/setup/supported_timezones
get info about current app:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/apps/YouTube -X GET
send youtube video to chromecast:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/apps/YouTube -X POST -d ‘v=oHg5SJYRHA0′
kill current running app:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/apps/YouTube -X DELETE
reboot the chromecast dongle:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/setup/reboot -d ‘{“params”:”now”}’ -X POST
factory default reset the chromecast dongle:
curl -H “Content-Type: application/json” http://10.0.1.2:8008/setup/reboot -d ‘{“params”:”fdr”}’ -X POST
Hopefully more to come… Focusing on the websocket connections now
I would like to be able to send commands (power, volume, source) to the tv through the hdmi-cec connection of the chromecast.
Chromecast Hacking Has Begun | fiquett.com