summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDante Catalfamo2021-10-12 22:32:42 -0400
committerDante Catalfamo2021-10-12 22:32:42 -0400
commit2331661b4282457e9e6a657dfb010239a36589a1 (patch)
tree9f462aa597bc0179680f44e2721d418438e5ffdb
parent269390e7eea36619843edb96ddf8d491741e7f6d (diff)
downloadblog-2331661b4282457e9e6a657dfb010239a36589a1.tar.gz
blog-2331661b4282457e9e6a657dfb010239a36589a1.tar.bz2
blog-2331661b4282457e9e6a657dfb010239a36589a1.zip
xprinter-wifi: make corrections
-rw-r--r--content/posts/WIP-xprinter-wifi/index.org16
1 files changed, 8 insertions, 8 deletions
diff --git a/content/posts/WIP-xprinter-wifi/index.org b/content/posts/WIP-xprinter-wifi/index.org
index a566239..8bba537 100644
--- a/content/posts/WIP-xprinter-wifi/index.org
+++ b/content/posts/WIP-xprinter-wifi/index.org
@@ -22,7 +22,7 @@ anywhere, and I suspect are device-specific.
Since booting into Windows every time I want to manage the printer's
network settings isn't ideal, I decided to reverse engineer the
-WiFi configuration protocol.
+WiFi configuration commands.
Initially I tried to run the configuration tool in wine, but it
couldn't communicate with the printer over USB, which wasn't too
@@ -64,7 +64,7 @@ and the printer's socket using Wireshark.
[[file:xprinter_wireshark.png]]
-In the examples below I've encoded the decimal numbers to hex to make
+In the examples below I've encoded the data being sent to hex to make
it easier to understand the contents of the packets.
Based on the traffic, I was able to come up with the following.
@@ -82,7 +82,7 @@ Based on the traffic, I was able to come up with the following.
#+RESULTS:
| c0 | a8 | 00 | 07 |
- Packate contents from wireshark:
+ Packet contents from wireshark:
=0000 1f 1b 1f 22 c0 a8 00 07=
@@ -107,7 +107,7 @@ Based on the traffic, I was able to come up with the following.
#+RESULTS:
| ff | ff | ff | 00 |
- Packate contents from wireshark:
+ Packet contents from wireshark:
=0000 1f 1b 1f b0 ff ff ff 00=
@@ -132,7 +132,7 @@ Based on the traffic, I was able to come up with the following.
#+RESULTS:
| c0 | a8 | 00 | 01 |
- Packate contents from wireshark:
+ Packet contents from wireshark:
=0000 1f 1b 1f b1 c0 a8 00 01=
@@ -151,7 +151,7 @@ Based on the traffic, I was able to come up with the following.
- Subnet mask =255.255.255.0=
- Gateway =192.168.0.1=
- Packate contents from wireshark:
+ Packet contents from wireshark:
=0000 1f 1b 1f b2 c0 a8 00 07 ff ff ff 00 c0 a8 00 01=
@@ -188,7 +188,7 @@ Based on the traffic, I was able to come up with the following.
#+RESULTS:
| 50 | 41 | 53 | 53 | 57 | 4f | 52 | 44 | 5f | 48 | 45 | 52 | 45 |
- Packate contents from wireshark (including string representation):
+ Packet contents from wireshark (including string representation):
#+begin_src
0000 1f 1b 1f b3 06 53 53 49 44 5f 48 45 52 45 00 50 .....SSID_HERE.P
0010 41 53 53 57 4f 52 44 5f 48 45 52 45 00 ASSWORD_HERE.
@@ -232,7 +232,7 @@ Based on the traffic, I was able to come up with the following.
- Key =PASSWORD_HERE=
- Key Type =WPA2_AES_PSK=
- Packate contents from wireshark (including string representation):
+ Packet contents from wireshark (including string representation):
#+begin_src
0000 1f 1b 1f b4 c0 a8 00 07 ff ff ff 00 c0 a8 00 01 ................