Skip to content
This repository has been archived by the owner on Mar 21, 2021. It is now read-only.

Development Info

L2N6H5B3 edited this page Feb 3, 2021 · 3 revisions

Updated 03/02/2021

Here is some information that may help with development

How to run and test the application

  1. Start the app
  2. Go to your Media Center PC and Navigate to Settings-->Extenders
  3. Find SoftSled in the list there and take note of the key (It should be in the form ***-370)
  4. Click configure
  5. In the key type in 1234 for the first 4 digits. Then type in the numbers that were listed for the next 3. In my example it would be 370. Then just start typing a number for the last one until you find one that works. I have found that if the first 2 numbers (37) add up to even then the last 2 will add up to even. If the first 2 are odd then the last 2 will be odd. So you shouldn't have to test more than 5 numbers to get it. It should then try to go throught the setup procedure and will fail at the Exchange part because we haven't figured out the authenticator stuff. Then type 3706, and WMC will try to pair the Extender. The certificates are a problem at this stage, and it seems the only way to get a successful pairing is to use the Linksys2200.cer certificate and change the password manually on the host machine and SoftSled config. If you're lucky, you'll get to the WMC home screen through RDP.

Projects that might help to look at...

UPnP Server for 360

Powerpoint Presentations explaining Extender Technology

Adaption Kit And Certification Program For Implementing Meda Center Extender and PlaysForSure

Introduction To Media Center Extender Functionality For Consumer Electronics Devices

Media Center Extender UI Remoting And AV Streaming Architecture

Media Center Extender Technology Overview

PlaysForSure Network Media Devices And Windows Vista

Information about ports used in communication (from here)

Application Protocol/Port Direction Network svchost.exe UDP 1900 Inbound Local Subnet svchost.exe TCP 3390 Inbound Local Subnet svchost.exe TCP 2177 Inbound, Outbound Local Subnet svchost.exe UDP 2177 Inbound, Outbound Local Subnet system TCP 10244 Inbound, Outbound Local Subnet ehshell.exe TCP 554 Inbound, Outbound Local Subnet ehshell.exe UDP 5004, 5005 Inbound, Outbound Local Subnet ehshell.exe TCP 8554-8558 Inbound, Outbound Local Subnet ehshell.exe UDP 50004-50013 Inbound, Outbound Local Subnet ehshell.exe UDP 7777-7781 Inbound, Outbound Local Subnet mcx2prov.exe Random Inbound, Outbound Internet mcrmgr.exe Random Inbound, Outbound Internet

Links to firmware for current Extenders...

Linksys Extenders

D-Link Extender

Source code for firmware of current Extenders....

  • D-Link Extender
  • Linksys hasn't put out their source code yet. Have requested it.

Ideas for reverse engineering...

  • Decompile windows code to figure out server side
  • Hack into an existing extender to figure out what is going on there. Need some sort of debug interface on it.
  • Load firmware of existing extender into an emulater.
  • Decompile 360 code (XEX) that is on the windows box.

Other ideas being tossed around...

  • Hack MC to use a different video renderer i.e. not the enhanced video renderer.
  • Enable login from a seperate monitor in order get a softsled like experience.
Clone this wiki locally