An old hack (2 years old according to my subversion db !!)
This started with my 5.1 Yamaha audio amplifier, this device has network access to listen to netradios directly ! I wanted to hack it to play a personal netradio.
I configured my dhcp to have it report my server as gateway and used wireshark to listen how it was connecting the Internet. It appeared that the menu on the device was provided by XML streams.
I first did some DNS spoofing and placed on my apache server a fake XML file, the Yamaha amplifier couldn’t tell the difference and I could play some local mp3 files.
The next step was to have both the normal radios and some personal radios. That’s here netsed becomes useful. The idea was to filter the main menu XML to add an extra item that liks to a local XML page linking to personal radio.
I never get to the step where I setup an Icecast server however I got the extra menu working.
netsed did basically the job, but for some reason it was not closing connections to the http server so it generated several timeout errors, that’s basically what I fixed in the netsed code.
i had the http-problems you mention as well 🙂
thanks! this might come in helpful.
I’ve been tryna figure out how to get this program to work. I use backtrack 4 and i attempted to use this three times to alter a netcat convo on the fly with no success. I cant find a tutorial on the web for netsed either. Anyone know of any resources that can be of use to me and can send it to my email?
I don’t think I quite understand what you are doing, however I know a little about netsed for hacking it in the past.
Well the first place is to read the readme file (my copy here: http://silicone.homelinux.org/trac/browser/netsed/trunk/README)
The second place is the source code !
Also if you are trying to use it for UDP, it does not work, it’s reported on debian:
I didn’t test it myself but by reading the code, it’s really TCP oriented, there are probably few changes needed to make it work on UDP.