Wireshark Dissector for Samsung remote protocol


From SamyGO
Revision as of 06:40, 29 March 2013 by Koka58 (talk | contribs) (Page created)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

There is a Wireshark[1] dissector for Samsung SmartTV remote control protocol. The dissector's sources and distribution are available at bitbucket[2]

This dissector allows to filter wireshark captures and decode remote control packets that are sent to the TV by WiFi and packets that are sent from TV to remote control unit. This dissector is based on WSGD[3] - Wireshark plugin which allows simple declarative creation of your own dissectors for custom protocols.

To install the dissector to your wireshark installation you need to do the following actions:

  1. Download[4] version of WSGD that matches your wireshark version and machine architecture and put it to your wireshark plugins folder
  2. Unzip dissector files[5] or one of the folders described here[6] (e.g. /usr/lib/wireshark/libwireshark0/plugins/).

To see dissector in action yo could do this:

  1. Run wireshark with installed dissector.
  2. Download sample capture[7] file and open it in wireshark.
  3. Type samsung_remote in the filter field;
  4. See filtered Samsung Remote packet
  5. Click one of packets marked with SR protocol and see decoded packet data

Screenshot of wireshark with sample cature and working dissector: Dissector.png