More insights on #Chromecast.
 
Hacking the ChromeCast
I got my hands on a ChromeCast device and decided to do some hacking.

The device is a DIAL server (http://www.dial-multiscreen.org/). It sends broadcasts on the local network which provides some interesting information. 

The Simple Service Discovery Protocol (SSDP) response says the device is running Linux: "Linux/3.0.8-g702c5ee, UPnP/1.0, Portable SDK for UPnP devices/1.6.18" and the "X-User-Agent" is "redsonic".

The device description response says the model name is "Eureka Dongle". 

I have found the following DIAL apps: 
http://192.168.0.x:8008/apps/YouTube
http://192.168.0.x:8008/apps/ChromeCast
http://192.168.0.x:8008/apps/Netflix
http://192.168.0.x:8008/apps/GoogleMusic

When a YouTube video is being cast, the DIAL Application Information Request says the "ramp" protocol is being used. If I send a HTTP Delete request to the app, I can stop the video. So this holds promise being able to control the apps remotely from outside of Chrome. However, I don't see those kinds of HTTP requests in the network traffic when using the YouTube video controls, so the actual control protocol might be proprietary.

When Netflix is running the Application Information Request says that its "capabilities" is websocket.

When Google Play Music and Chrome Casting apps are running,  the DIAL Application Information Request says the "ramp" protocol is being used.

#chromecast  
11
3
Shrey Malhotra's profile photoEd Marley's profile photo
Add a comment...