And another thing
I swear I'm going out in a minute, but:
Running strings on the firmware for a Dlink wireless bridge I have gives output that includes the following:
From isolation / Deliver me o Xbox - / Through the ethernet Copyright (c) Microsoft Corporation. All Rights Reserved. Device is Xbox Compatible. Copyright (c) Microsoft Corporation. All Rights Reserved.. This confused me for a while until I plugged it into an Xbox 360 and discovered that despite it being plugged into the ethernet port, I could control the wifi options including network selection and encryption method. Does anyone have the faintest idea how this is implemented? A tcpdump of the Xbox booting reveals some ICMP6 packets, a bunch of DHCP and some uPNP service discovery. uPNP seems like a plausible option, but I've got no idea how to probe a device for uPNP services using Linux. Has anyone played with reverse engineering this stuff? Googling didn't seem to show anything up.