<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://wiki.samygo.tv/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Koka58</id>
	<title>SamyGO - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="http://wiki.samygo.tv/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Koka58"/>
	<link rel="alternate" type="text/html" href="http://wiki.samygo.tv/index.php?title=Special:Contributions/Koka58"/>
	<updated>2026-05-10T22:14:56Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>http://wiki.samygo.tv/index.php?title=Wireshark_Dissector_for_Samsung_remote_protocol&amp;diff=3753</id>
		<title>Wireshark Dissector for Samsung remote protocol</title>
		<link rel="alternate" type="text/html" href="http://wiki.samygo.tv/index.php?title=Wireshark_Dissector_for_Samsung_remote_protocol&amp;diff=3753"/>
		<updated>2013-03-29T06:40:10Z</updated>

		<summary type="html">&lt;p&gt;Koka58: Page created&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There is a Wireshark[http://www.wireshark.org/] dissector for Samsung SmartTV [[Samsung_TV_network_remote_control_protocol|remote control protocol]]. The dissector's sources and distribution are available at bitbucket[https://bitbucket.org/Koka58/samsung-remote-dissector/]&lt;br /&gt;
&lt;br /&gt;
This dissector allows to filter wireshark captures and decode remote control packets that are sent to the TV by WiFi and packets that are sent from TV to remote control unit. This dissector is based on WSGD[http://wsgd.free.fr/] - Wireshark plugin which allows simple declarative creation of your own dissectors for custom protocols.&lt;br /&gt;
&lt;br /&gt;
To install the dissector to your wireshark installation you need to do the following actions:&lt;br /&gt;
# '''Download'''[http://wsgd.free.fr/download.html] version of WSGD that matches your wireshark version and machine architecture and '''put it''' to your wireshark plugins folder&lt;br /&gt;
# '''Unzip''' dissector files[https://bitbucket.org/Koka58/samsung-remote-dissector/downloads/samsung-remote-dissector.zip] or one of the folders described here[http://wsgd.free.fr/installation.html] (e.g. ''/usr/lib/wireshark/libwireshark0/plugins/'').&lt;br /&gt;
&lt;br /&gt;
To see dissector in action yo could do this:&lt;br /&gt;
# '''Run''' wireshark with installed dissector.&lt;br /&gt;
# '''Download''' sample capture[https://bitbucket.org/Koka58/samsung-remote-dissector/downloads/samsung_sample.cap] file and open it in wireshark.&lt;br /&gt;
# Type ''samsung_remote'' in the '''filter''' field;&lt;br /&gt;
# See filtered Samsung Remote packet&lt;br /&gt;
# Click one of packets marked with ''SR'' protocol and see decoded packet data&lt;br /&gt;
&lt;br /&gt;
Screenshot of wireshark with sample cature and working dissector:&lt;br /&gt;
[[File:Dissector.png]]&lt;/div&gt;</summary>
		<author><name>Koka58</name></author>
		
	</entry>
	<entry>
		<id>http://wiki.samygo.tv/index.php?title=File:Dissector.png&amp;diff=3752</id>
		<title>File:Dissector.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.samygo.tv/index.php?title=File:Dissector.png&amp;diff=3752"/>
		<updated>2013-03-29T06:35:50Z</updated>

		<summary type="html">&lt;p&gt;Koka58: Wireshark Remote Protocol Dissector&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Wireshark Remote Protocol Dissector&lt;/div&gt;</summary>
		<author><name>Koka58</name></author>
		
	</entry>
</feed>