From befc250be0dc59b5b4c9a52a5a1b84863eab03dc Mon Sep 17 00:00:00 2001 From: cqql Date: Wed, 3 Jul 2024 21:45:37 +0200 Subject: [PATCH] fixed typo --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c3d2db8..82ab37c 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,7 @@ I knew someone who had [Bluesound](https://www.bluesound.com/) WIFI speakers and They were controllable by a dedicated smartphone app. -I installed a package capture app on my phone and tried a bunch of things in the Bluesound app. To my amazement, the app was sending pure, **unencrypted and unauthenticated `http` requests** to the speaker for every action I took, like play, pause, change track, etc. I captured enough to reverse engineer the protocol. +I installed a packet capture app on my phone and tried a bunch of things in the Bluesound app. To my amazement, the app was sending pure, **unencrypted and unauthenticated `http` requests** to the speaker for every action I took, like play, pause, change track, etc. I captured enough to reverse engineer the protocol. What I thought would be fun, was to write a script that scans the whole network for Bluesound speakers, and then plays the [nyancat song](https://www.youtube.com/watch?v=2yJgwwDcgV8&pp=ygUIbnlhbiBjYXQ%3D) on all of them (it was still enough of a meme back then).