1,649
edits
(→Notes) |
|||
Line 11: | Line 11: | ||
==Proposed method== | ==Proposed method== | ||
# Construct a minimal Rako system with one channel and an Ethernet bridge '''[Complete]''' | # Construct a minimal Rako system with one channel and an Ethernet bridge '''[Complete]''' | ||
# Contact Rako to see if they have an API available '''[In progress]''' | |||
# Obtain connectivity between the bridge and the iPhone app and/or RakoSoft on a network that allows snooping '''[In progress]''' | # Obtain connectivity between the bridge and the iPhone app and/or RakoSoft on a network that allows snooping '''[In progress]''' | ||
# Monitor traffic between iPhone app/RakoSoft/Bridge Web UI to determine a suitable candidate for reverse engineering | # Monitor traffic between iPhone app/RakoSoft/Bridge Web UI to determine a suitable candidate for reverse engineering | ||
# Reverse enginner protocol | # Reverse enginner protocol | ||
# Implement the protocol with Java :-) | # Implement the protocol with Java :-) | ||
==Notes== | ==Notes== | ||
I have had a little snoop on the RakoSoft traffic with [http://www.wireshark.org/ WireShark] and it appears to use non-trivial protocol - darn... | I have had a little snoop on the RakoSoft traffic with [http://www.wireshark.org/ WireShark] and it appears to use non-trivial protocol - darn... |
edits