Skip to content

I sniffed the on-off commands.. Could it be supported? #118

@n00btotal

Description

@n00btotal

Hi!

I used the BTscan.py, found the device, but no command worked. I did some research on the strip (connected to a table) with gattool:

Attempting to connect to 23:xx:xx:xx:xx:b6
Connection successful
[23:xx:xx:xx:xx:b6][LE]> primary
attr handle: 0x0001, end grp handle: 0xffff uuid: 0000ffe0-0000-1000-8000-00805f9b34fb
[23:xx:xx:xx:xx:b6][LE]> Characteristics
handle: 0x0002, char properties: 0x16, char value handle: 0x0003, uuid: 0000ffe1-0000-1000-8000-00805f9b34fb
[23:xx:xx:xx:xx:b6][LE]> disconnect

On / off commands are 7bff0401ffffffffbf and 7bff0400ffffffffbf, below are the rows from wireshark.

ATT	42	7bff0401ffffffffbf	Sent Write Command, Handle: 0x0003 (Unknown)
ATT	42	7bff0400ffffffffbf	Sent Write Command, Handle: 0x0003 (Unknown)

I'm having troubles working the rest out..

Is it possible to integrate this in elkbledom?

There is an app, (that I use to sniff commands) that can do sound stuff, special effects and stuff, and I can sniff those commands aswell.. But as for now, I just would like to have some sort of control over it 😄

Regards

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions