I am trying to get readings from an ultrasonic thickness tester without using the included software, but I haven't been able to interpret the measurement readings from the tester.
Below are the hex values that are sent from the tester, and the corresponding decimal value that is displayed in the software.
3A 30 62 30 30 44 39 37 30 30 65 36 0D 0A 1.51
3A 30 62 30 30 44 66 61 30 30 34 39 0D 0A 2.50
3A 30 62 30 30 44 37 62 30 31 63 62 0D 0A 3.79
3A 30 62 30 30 44 38 32 30 31 64 32 0D 0A 3.86
3A 30 62 30 30 44 63 37 30 31 31 37 0D 0A 4.55
3A 30 62 30 30 44 39 34 30 62 65 65 0D 0A 29.64
3A 30 62 30 30 44 39 63 30 62 66 36 0D 0A 29.72
3A 30 62 30 30 44 63 61 30 62 32 34 0D 0A 30.18
3A 30 62 30 30 44 65 64 30 62 34 37 0D 0A 30.53
3A 30 62 30 30 44 38 65 33 65 31 62 0D 0A 160.14
3A 30 62 30 30 44 64 66 33 65 36 63 0D 0A 160.95
Any help on how I get from the hex values to the decimal value would be very much appreciated.
ASCII equivalent (I have omitted CR and LF which are at the end of each line) :
:0b00D9700e6 1.51
:0b00Dfa0049 2.50
:0b00D7b01cb 3.79
:0b00D8201d2 3.86
:0b00Dc70117 4.55
:0b00D940bee 29.64
:0b00D9c0bf6 29.72
:0b00Dca0b24 30.18
:0b00Ded0b47 30.53
:0b00D8e3e1b 160.14
:0b00Ddf3e6c 160.95
Finally figured it out:
The data is the two bytes after :0b00D, LSB first, multiplied by 100.
ASCII Hex Decimal
:0b00D9700e6 0097 1.51
:0b00Dfa0049 00fa 2.50
:0b00D7b01cb 017b 3.79
:0b00D8201d2 0182 3.86
:0b00Dc70117 01c7 4.55
:0b00D940bee 0b94 29.64
:0b00D9c0bf6 0b9c 29.72
:0b00Dca0b24 0bca 30.18
:0b00Ded0b47 0bed 30.53
:0b00D8e3e1b 3e8e 160.14
:0b00Ddf3e6c 3edf 160.95
Related
I'm creating a low level HTTP server and I want to validate that my responses are correct.
Some of them are fine, but others fail. I have saved some responses as bytes and viewing them in HxD, and they look correct, but they obviously aren't in some way.
Here's the start of one HTTP response formatted as hex:
48 54 54 50 2F 31 2E 31 20 32 30 30 20 4F 4B 0D 0A 43 4F 4E 54 45 4E
54 2D 54 59 50 45 3A 20 69 6D 61 67 65 2F 70 6E 67 0D 0A 4C 41 53 54
2D 4D 4F 44 49 46 49 45 44 3A 20 53 75 6E 2C 20 30 31 20 4D 61 79 20
32 30 32 32 20 32 32 3A 32 34 3A 32 34 20 47 4D 54 0D 0A 41 43 43 45
50 54 2D 52 41 4E 47 45 53 3A 20 62 79 74 65 73 0D 0A 45 54 41 47 3A
20 22 37 35 37 35 35 33 36 61 61 35 64 64 38 31 3A 30 22 0D 0A 53 45
52 56 45 52 3A 20 4D 69 63 72 6F 73 6F 66 74 2D 49 49 53 2F 31 30 2E
30 0D 0A 58 2D 50 4F 57 45 52 45 44 2D 42 59 3A 20 41 53 50 2E 4E 45
54 0D 0A 44 41 54 45 3A 20 57 65 64 2C 20 30 34 20 4D 61 79 20 32 30
32 32 20 30 39 3A 30 31 3A 34 38 20 47 4D 54 0D 0A 43 4F 4E 54 45 4E
54 2D 4C 45 4E 47 54 48 3A 20 39 38 37 35 37 0D 0A 43 6F 6E 6E 65 63
74 69 6F 6E 3A 20 63 6C 6F 73 65 0D 0A 0D 0A 0D 0A 89 50 4E 47
How can I validate that the response I'm creating is valid according to RFC 2616?
I'm working in .NET but I don't mind if it's an online tool or a different platform.
Edit:
I've solved my issue with this particular example (3 crlfs instead of 2 between head and body) but I'd still like to know how I can validate these requests automatically.
I ended up achieving this with this nuget package and the following code:
if (System.Diagnostics.Debugger.IsAttached)
{
using (var handler = new HttpParserDelegate())
using (var parser = new HttpCombinedParser(handler))
{
parser.Execute(arr);
}
if (!handler.HttpRequestResponse.IsEndOfMessage)
{
System.Diagnostics.Debugger.Break();
throw new InvalidOperationException($"An HTTP response was serialized but it is not a valid response");
}
}
Hi i am having the following Rs485 data in that i know the value but unable to decrypt the data i am tried in taking 2's compliment but it comes to close but not get the correct data
3A 30 31 30 33 30 32 30 31 38 42 36 45 0D 0A
in above rs 485 data value is=395 that is 3842 =395 and 3645 =LRC and 0D0A=End character
3A 30 31 30 33 30 32 30 31 38 46 36 41 0D 0A
in above rs 485 data value is=399 that is 3846=399 and 3641 =LRC and 0D0A=End character
3A 30 31 30 33 30 32 30 31 39 30 36 39 0D 0A
in above rs 485 data value is=400 that is 3930 =400 and 3639 =LRC and 0D0A=End character
3A 30 31 30 33 30 32 30 31 39 32 36 37 0D 0A
in above rs 485 data value is=402 that is 3932 =402 and 3637 =LRC and 0D0A=End character
Please guide me to get LRC value and data.Lrc value is summing of data and taking 2's compliment negotion but i don't know how to take lrc value.Please help me to get data and LRC value calculation
Using the first line as an example, convert the pairs of ASCII bytes in to single hex bytes:
3A 30 31 30 33 30 32 30 31 38 42 xx xx 0D 0A ASCII
01 03 02 01 8B hex values converted to binary bytes
01 + 03 + 02 + 01 + 8B = 92 sum up the hex values
00 - 92 = 6E take the two's complement
36 45 convert the 6E to ASCII
3A 30 31 30 33 30 32 30 31 38 42 36 45 0D 0A include the 36 45 into the message
For the last line:
3A 30 31 30 33 30 32 30 31 39 32 xx xx 0D 0A
01 + 03 + 02 + 01 + 92 = 99
00 - 99 = 67
3A 30 31 30 33 30 32 30 31 39 32 36 37 0D 0A
I have a tab-separated file with records like these:
no Newcastle 1 NULL NULL NULL
uk Ньюкасл 1 NULL NULL NULL
ja ニューカッスル 1 NULL NULL NULL
To import them to sqlite, I use:
create table cities (country text, name text, count integer...);
.separator ' '
.import file cities
(where ' ' above contains a tab character). The file seems to be importing fine, but some non-ASCII chars get corrupted, especially at end of strings, and replaced with question marks.
no Newcastle 1 NULL NULL NULL
uk Ньюкасл 1 NULL NULL NULL
ja ニューカッ? 1 NULL NULL NULL
The corruption occurs at import. I tried using PRAGMA encoding = "UTF-8"; before importing, but it doesn't help. Any ideas?
update per request from the user CL below
Hexdump of a portion of the input file (the same portion as shown above with some additional numeric values which are irrelevant here; in the ASCII column the corrupted chars precede the "1" which follows the "ja"):
00008180 30 30 30 30 30 30 32 30 37 33 32 33 39 09 31 34 |0000002073239.14|
00008190 38 36 33 39 36 31 33 34 35 33 33 33 36 35 38 38 |8639613453336588|
000081a0 09 75 6b 09 d0 9d d1 8c d1 8e d0 ba d0 b0 d1 81 |.uk.............|
000081b0 d0 bb 09 31 09 4e 55 4c 4c 09 4e 55 4c 4c 09 4e |...1.NULL.NULL.N|
000081c0 55 4c 4c 0a 31 32 30 30 30 30 30 30 30 30 30 30 |ULL.120000000000|
000081d0 32 30 37 33 32 34 30 09 31 34 38 36 33 39 36 31 |2073240.14863961|
000081e0 33 34 35 33 33 33 36 35 38 38 09 6a 61 09 e3 83 |3453336588.ja...|
000081f0 8b e3 83 a5 e3 83 bc e3 82 ab e3 83 83 e3 82 b9 |................|
00008200 e3 83 ab 09 31 09 4e 55 4c 4c 09 4e 55 4c 4c 09 |....1.NULL.NULL.|
00008210 4e 55 4c 4c 0a 31 32 30 30 30 30 30 30 30 30 30 |NULL.12000000000|
00008220 30 32 30 37 33 32 34 31 09 31 34 38 36 33 39 36 |02073241.1486396|
Result of select hex(name) for the offending record:
hex(name)
--------------------------------------
31323030303030303030303032303733323430
This has nothing to do with importing; the sqlite3 command-line tool does not truncate strings correctly when using .width.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 9 years ago.
Improve this question
I'm analyzing a TCPdump file with Wireshark. Within the connection traces, I saw "brvread" port 1054 as both source and destination ports. When I searched it in the Internet, the only thing I found out was that it may be an indication of an attack or vulnerability. But apart from that I could not find any other information about what brvread is. Does anybody have any idea about it?
The package looks like this (Data from Angelo Neuschitzer):
# Time Source Target Protoco Length Info
1 0.000000000 192.168.2.107 239.255.255.250 UDP 1310 Source port: brvread Destination port: us-cli
Content:
NOTIFY * HTTP/1.1
x-type: localDvr
x-filter: 5107dcd0-aed6-4f2a-aa93-b5fea9caffec
x-lastUserActivity: 12/23/2013 10:03:29 AM
x-location: http://192.168.2.107:8080/dvrfs/info.xml
x-device: 3244238e-0e41-4f90-ae8a-35b8c84a11a2
x-debug: http://192.168.2.107:8080
<node count='961525'>
<activities>
<p15n stamp='08CF44F5A880AA10ECE09BE967E7'/>
<schedver dver='3' ver='600' pendcap='False' />
<x/>
<recreq src='udp://239.35.20.43:10000:79b02293-93df-46f1-976d-c651c578fed7?r=3537009&p=1&ssrc0=514095545&r0=3537009&ch=11&profile=multicastICC&forceDetune=true&age=-1&skip=0' st='0x0' et='0xFFFFFFFFFFFFFFFF' postpad='0' rate='3537009' pri='1'/>
<recordver ver='1' verid='0' size='137438953472' free='136834973696' />
<x/>
<tune src='udp://239.35.20.43:10000:79b02293-93df-46f1-976d-c651c578fed7' pipe='FULLSCREEN' ct='0xd6628ecdc4833e0d' pil='0x0' rate='0x35f871' stopped='false'/>
<tune src='udp://239.35.20.43:10000:79b02293-93df-46f1-976d-c651c578fed7' rate='0x35f871' pil='0x0'/>
<record url='http://192.168.2.107:8080/dvrfs/v17' src='udp://239.35.20.43:10000:79b02293-93df-46f1-976d-c651c578fed7' pri='1' st='0xd66288ea884a134e' et='0xd6628eced30f4a81' stopped='false'/>
</activities>
</node>
(Indentation manually, there are no newlines etc. in package)
Following is a dump from wireshark:
0000 01 00 5e 7f ff fa 00 23 a3 97 87 d1 08 00 45 60 ..^....#......E`
0010 05 10 12 4d 00 00 01 11 ef 22 c0 a8 02 6b ef ff ...M....."...k..
0020 ff fa 04 1e 1f 92 04 fc 98 bd 02 57 9c 74 3e 4c ...........W.t>L
0030 ad cc 43 83 bb 3c a2 de 24 9c 64 00 21 00 10 00 ..C..<..$.d.!...
0040 31 04 c3 d6 62 8e d5 8a 16 3f dd 7d 1a a7 28 ac 1...b....?.}..(.
0050 4c 21 c7 d1 24 5f a6 55 a6 5b e5 4e 4f 54 49 46 L!..$_.U.[.NOTIF
0060 59 20 2a 20 48 54 54 50 2f 31 2e 31 0d 0a 78 2d Y * HTTP/1.1..x-
0070 74 79 70 65 3a 20 6c 6f 63 61 6c 44 76 72 0d 0a type: localDvr..
0080 78 2d 66 69 6c 74 65 72 3a 20 35 31 30 37 64 63 x-filter: 5107dc
0090 64 30 2d 61 65 64 36 2d 34 66 32 61 2d 61 61 39 d0-aed6-4f2a-aa9
00a0 33 2d 62 35 66 65 61 39 63 61 66 66 65 63 0d 0a 3-b5fea9caffec..
00b0 78 2d 6c 61 73 74 55 73 65 72 41 63 74 69 76 69 x-lastUserActivi
00c0 74 79 3a 20 31 32 2f 32 33 2f 32 30 31 33 20 31 ty: 12/23/2013 1
00d0 30 3a 30 33 3a 32 39 20 41 4d 0d 0a 78 2d 6c 6f 0:03:29 AM..x-lo
00e0 63 61 74 69 6f 6e 3a 20 68 74 74 70 3a 2f 2f 31 cation: http://1
00f0 39 32 2e 31 36 38 2e 32 2e 31 30 37 3a 38 30 38 92.168.2.107:808
0100 30 2f 64 76 72 66 73 2f 69 6e 66 6f 2e 78 6d 6c 0/dvrfs/info.xml
0110 0d 0a 78 2d 64 65 76 69 63 65 3a 20 33 32 34 34 ..x-device: 3244
0120 32 33 38 65 2d 30 65 34 31 2d 34 66 39 30 2d 61 238e-0e41-4f90-a
0130 65 38 61 2d 33 35 62 38 63 38 34 61 31 31 61 32 e8a-35b8c84a11a2
0140 0d 0a 78 2d 64 65 62 75 67 3a 20 68 74 74 70 3a ..x-debug: http:
0150 2f 2f 31 39 32 2e 31 36 38 2e 32 2e 31 30 37 3a //192.168.2.107:
0160 38 30 38 30 0d 0a 0d 0a 3c 6e 6f 64 65 20 63 6f 8080....<node co
0170 75 6e 74 3d 27 39 36 31 35 32 35 27 3e 3c 61 63 unt='961525'><ac
0180 74 69 76 69 74 69 65 73 3e 3c 70 31 35 6e 20 73 tivities><p15n s
0190 74 61 6d 70 3d 27 30 38 43 46 34 34 46 35 41 38 tamp='08CF44F5A8
01a0 38 30 41 41 31 30 45 43 45 30 39 42 45 39 36 37 80AA10ECE09BE967
01b0 45 37 27 2f 3e 3c 73 63 68 65 64 76 65 72 20 64 E7'/><schedver d
01c0 76 65 72 3d 27 33 27 20 76 65 72 3d 27 36 30 30 ver='3' ver='600
01d0 27 20 70 65 6e 64 63 61 70 3d 27 46 61 6c 73 65 ' pendcap='False
01e0 27 20 2f 3e 3c 78 2f 3e 3c 72 65 63 72 65 71 20 ' /><x/><recreq
01f0 73 72 63 3d 27 75 64 70 3a 2f 2f 32 33 39 2e 33 src='udp://239.3
0200 35 2e 32 30 2e 34 33 3a 31 30 30 30 30 3a 37 39 5.20.43:10000:79
0210 62 30 32 32 39 33 2d 39 33 64 66 2d 34 36 66 31 b02293-93df-46f1
0220 2d 39 37 36 64 2d 63 36 35 31 63 35 37 38 66 65 -976d-c651c578fe
0230 64 37 3f 72 3d 33 35 33 37 30 30 39 26 61 6d 70 d7?r=3537009&
0240 3b 70 3d 31 26 61 6d 70 3b 73 73 72 63 30 3d 35 ;p=1&ssrc0=5
0250 31 34 30 39 35 35 34 35 26 61 6d 70 3b 72 30 3d 14095545&r0=
0260 33 35 33 37 30 30 39 26 61 6d 70 3b 63 68 3d 31 3537009&ch=1
0270 31 26 61 6d 70 3b 70 72 6f 66 69 6c 65 3d 6d 75 1&profile=mu
0280 6c 74 69 63 61 73 74 49 43 43 26 61 6d 70 3b 66 lticastICC&f
0290 6f 72 63 65 44 65 74 75 6e 65 3d 74 72 75 65 26 orceDetune=true&
02a0 61 6d 70 3b 61 67 65 3d 2d 31 26 61 6d 70 3b 73 amp;age=-1&s
02b0 6b 69 70 3d 30 27 20 73 74 3d 27 30 78 30 27 20 kip=0' st='0x0'
02c0 65 74 3d 27 30 78 46 46 46 46 46 46 46 46 46 46 et='0xFFFFFFFFFF
02d0 46 46 46 46 46 46 27 20 70 6f 73 74 70 61 64 3d FFFFFF' postpad=
02e0 27 30 27 20 72 61 74 65 3d 27 33 35 33 37 30 30 '0' rate='353700
02f0 39 27 20 70 72 69 3d 27 31 27 2f 3e 3c 72 65 63 9' pri='1'/><rec
0300 6f 72 64 76 65 72 20 76 65 72 3d 27 31 27 20 76 ordver ver='1' v
0310 65 72 69 64 3d 27 30 27 20 73 69 7a 65 3d 27 31 erid='0' size='1
0320 33 37 34 33 38 39 35 33 34 37 32 27 20 66 72 65 37438953472' fre
0330 65 3d 27 31 33 36 38 33 34 39 37 33 36 39 36 27 e='136834973696'
0340 20 2f 3e 3c 78 2f 3e 3c 74 75 6e 65 20 73 72 63 /><x/><tune src
0350 3d 27 75 64 70 3a 2f 2f 32 33 39 2e 33 35 2e 32 ='udp://239.35.2
0360 30 2e 34 33 3a 31 30 30 30 30 3a 37 39 62 30 32 0.43:10000:79b02
0370 32 39 33 2d 39 33 64 66 2d 34 36 66 31 2d 39 37 293-93df-46f1-97
0380 36 64 2d 63 36 35 31 63 35 37 38 66 65 64 37 27 6d-c651c578fed7'
0390 20 70 69 70 65 3d 27 46 55 4c 4c 53 43 52 45 45 pipe='FULLSCREE
03a0 4e 27 20 63 74 3d 27 30 78 64 36 36 32 38 65 63 N' ct='0xd6628ec
03b0 64 63 34 38 33 33 65 30 64 27 20 70 69 6c 3d 27 dc4833e0d' pil='
03c0 30 78 30 27 20 72 61 74 65 3d 27 30 78 33 35 66 0x0' rate='0x35f
03d0 38 37 31 27 20 73 74 6f 70 70 65 64 3d 27 66 61 871' stopped='fa
03e0 6c 73 65 27 2f 3e 3c 74 75 6e 65 20 73 72 63 3d lse'/><tune src=
03f0 27 75 64 70 3a 2f 2f 32 33 39 2e 33 35 2e 32 30 'udp://239.35.20
0400 2e 34 33 3a 31 30 30 30 30 3a 37 39 62 30 32 32 .43:10000:79b022
0410 39 33 2d 39 33 64 66 2d 34 36 66 31 2d 39 37 36 93-93df-46f1-976
0420 64 2d 63 36 35 31 63 35 37 38 66 65 64 37 27 20 d-c651c578fed7'
0430 72 61 74 65 3d 27 30 78 33 35 66 38 37 31 27 20 rate='0x35f871'
0440 70 69 6c 3d 27 30 78 30 27 2f 3e 3c 72 65 63 6f pil='0x0'/><reco
0450 72 64 20 75 72 6c 3d 27 68 74 74 70 3a 2f 2f 31 rd url='http://1
0460 39 32 2e 31 36 38 2e 32 2e 31 30 37 3a 38 30 38 92.168.2.107:808
0470 30 2f 64 76 72 66 73 2f 76 31 37 27 20 73 72 63 0/dvrfs/v17' src
0480 3d 27 75 64 70 3a 2f 2f 32 33 39 2e 33 35 2e 32 ='udp://239.35.2
0490 30 2e 34 33 3a 31 30 30 30 30 3a 37 39 62 30 32 0.43:10000:79b02
04a0 32 39 33 2d 39 33 64 66 2d 34 36 66 31 2d 39 37 293-93df-46f1-97
04b0 36 64 2d 63 36 35 31 63 35 37 38 66 65 64 37 27 6d-c651c578fed7'
04c0 20 70 72 69 3d 27 31 27 20 73 74 3d 27 30 78 64 pri='1' st='0xd
04d0 36 36 32 38 38 65 61 38 38 34 61 31 33 34 65 27 66288ea884a134e'
04e0 20 65 74 3d 27 30 78 64 36 36 32 38 65 63 65 64 et='0xd6628eced
04f0 33 30 66 34 61 38 31 27 20 73 74 6f 70 70 65 64 30f4a81' stopped
0500 3d 27 66 61 6c 73 65 27 2f 3e 3c 2f 61 63 74 69 ='false'/></acti
0510 76 69 74 69 65 73 3e 3c 2f 6e 6f 64 65 3e vities></node>
Ok, it is much easier to proceed having all those details available.
What you actually see is Simple Service Discovery Protocol (SSDP) message. (Wikipedia)
brvread is an old name, came from IANA and used by Wireshark.
This port is also associated with AckCmd trojan. Interesting fact:
The interesting feature about this backdoor is that it only uses ACK
packets. This means that a standard connection is not established;
rather, data will be transmitted directly using ACK packets. This
makes it possible for the Trojan to bypass some firewalls.
So I think the actual explanation is quite trivial: some other service sits on that port and talks SSDP.
I have a smart electricity meter that connects to the pc through RS485 serial cable. This hardware has a software that you can read its internal registers and view them on the software. When I tried to read the registers of the meter through the software, I ran a serial port monitor software to sniff the bytes being sent and received to the meter.
This is the sniffing result:
Port opened
Request: 9/18/2012 7:04:04 PM.28064
2F 3F 21 0D 0A /?!..
Answer: 9/18/2012 7:04:04 PM.70264 (+0.4219 seconds)
2F 45 4C 53 35 5C 40 56 38 2E 32 30 20 20 20 20 /ELS5\#V8.20
20 20 20 20 20 0D 0A ..
Request: 9/18/2012 7:04:05 PM.53064 (+0.0156 seconds)
06 30 35 30 0D 0A .050..
Answer: 9/18/2012 7:04:05 PM.06264 (+0.5313 seconds)
02 43 2E 31 2E 30 28 33 35 30 36 34 32 36 37 29 .C.1.0(35064267)
0D 0A 30 2E 30 2E 30 28 33 35 30 36 34 32 36 37 ..0.0.0(35064267
30 30 30 30 30 30 30 30 20 20 20 20 20 20 20 20 00000000
29 0D 0A 30 2E 39 2E 31 28 31 39 30 32 33 37 29 )..0.9.1(190237)
0D 0A 30 2E 39 2E 32 28 31 38 30 39 31 32 29 0D ..0.9.2(180912).
0A 31 2E 38 2E 30 28 30 30 30 30 30 32 36 2A 6B .1.8.0(0000026*k
57 68 29 0D 0A 31 2E 38 2E 30 2A 30 31 28 30 30 Wh)..1.8.0*01(00
30 30 30 32 36 2A 6B 57 68 29 0D 0A 31 2E 38 2E 00026*kWh)..1.8.
30 2A 30 32 28 30 30 30 30 30 32 36 2A 6B 57 68 0*02(0000026*kWh
29 0D 0A 31 2E 38 2E 30 2A 30 33 28 30 30 30 30 )..1.8.0*03(0000
30 32 36 2A 6B 57 68 29 0D 0A 31 2E 38 2E 30 2A 026*kWh)..1.8.0*
30 34 28 30 30 30 30 30 30 30 2A 6B 57 68 29 0D 04(0000000*kWh).
0A 32 2E 38 2E 30 28 30 30 30 30 30 30 30 2A 6B .2.8.0(0000000*k
57 68 29 0D 0A 32 2E 38 2E 30 2A 30 31 28 30 30 Wh)..2.8.0*01(00
30 30 30 30 30 2A 6B 57 68 29 0D 0A 32 2E 38 2E 00000*kWh)..2.8.
30 2A 30 32 28 30 30 30 30 30 30 30 2A 6B 57 68 0*02(0000000*kWh
29 0D 0A 32 2E 38 2E 30 2A 30 33 28 30 30 30 30 )..2.8.0*03(0000
30 30 30 2A 6B 57 68 29 0D 0A 32 2E 38 2E 30 2A 000*kWh)..2.8.0*
30 34 28 30 30 30 30 30 30 30 2A 6B 57 68 29 0D 04(0000000*kWh).
0A 35 2E 38 2E 30 28 30 30 30 30 30 32 36 2A 6B .5.8.0(0000026*k
76 61 72 68 29 0D 0A 35 2E 38 2E 30 2A 30 31 28 varh)..5.8.0*01(
30 30 30 30 30 32 36 2A 6B 76 61 72 68 29 0D 0A 0000026*kvarh)..
35 2E 38 2E 30 2A 30 32 28 30 30 30 30 30 32 36 5.8.0*02(0000026
2A 6B 76 61 72 68 29 0D 0A 35 2E 38 2E 30 2A 30 *kvarh)..5.8.0*0
33 28 30 30 30 30 30 32 36 2A 6B 76 61 72 68 29 3(0000026*kvarh)
0D 0A 35 2E 38 2E 30 2A 30 34 28 30 30 30 30 30 ..5.8.0*04(00000
30 30 2A 6B 76 61 72 68 29 0D 0A 36 2E 38 2E 30 00*kvarh)..6.8.0
28 30 30 30 30 30 30 30 2A 6B 76 61 72 68 29 0D (0000000*kvarh).
0A 36 2E 38 2E 30 2A 30 31 28 30 30 30 30 30 30 .6.8.0*01(000000
30 2A 6B 76 61 72 68 29 0D 0A 36 2E 38 2E 30 2A 0*kvarh)..6.8.0*
30 32 28 30 30 30 30 30 30 30 2A 6B 76 61 72 68 02(0000000*kvarh
29 0D 0A 36 2E 38 2E 30 2A 30 33 28 30 30 30 30 )..6.8.0*03(0000
30 30 30 2A 6B 76 61 72 68 29 0D 0A 36 2E 38 2E 000*kvarh)..6.8.
30 2A 30 34 28 30 30 30 30 30 30 30 2A 6B 76 61 0*04(0000000*kva
72 68 29 0D 0A 37 2E 38 2E 30 28 30 30 30 30 30 rh)..7.8.0(00000
30 30 2A 6B 76 61 72 68 29 0D 0A 37 2E 38 2E 30 00*kvarh)..7.8.0
2A 30 31 28 30 30 30 30 30 30 30 2A 6B 76 61 72 *01(0000000*kvar
68 29 0D 0A 37 2E 38 2E 30 2A 30 32 28 30 30 30 h)..7.8.0*02(000
30 30 30 30 2A 6B 76 61 72 68 29 0D 0A 37 2E 38 0000*kvarh)..7.8
2E 30 2A 30 33 28 30 30 30 30 30 30 30 2A 6B 76 .0*03(0000000*kv
61 72 68 29 0D 0A 37 2E 38 2E 30 2A 30 34 28 30 arh)..7.8.0*04(0
30 30 30 30 30 30 2A 6B 76 61 72 68 29 0D 0A 39 000000*kvarh)..9
2E 36 2E 31 28 30 30 2E 30 30 2A 6B 56 41 29 28 .6.1(00.00*kVA)(
30 30 30 30 30 30 30 30 30 30 29 0D 0A 39 2E 36 0000000000)..9.6
2E 31 2A 30 31 28 30 30 2E 30 30 2A 6B 56 41 29 .1*01(00.00*kVA)
28 30 30 30 30 30 30 30 30 30 30 29 0D 0A 39 2E (0000000000)..9.
36 2E 31 2A 30 32 28 30 30 2E 30 30 2A 6B 56 41 6.1*02(00.00*kVA
29 28 30 30 30 30 30 30 30 30 30 30 29 0D 0A 39 )(0000000000)..9
2E 36 2E 31 2A 30 33 28 30 30 2E 37 34 2A 6B 56 .6.1*03(00.74*kV
41 29 28 30 34 30 35 31 32 30 30 30 30 29 0D 0A A)(0405120000)..
39 2E 36 2E 31 2A 30 34 28 30 30 2E 30 34 2A 6B 9.6.1*04(00.04*k
56 41 29 28 33 30 30 34 31 32 32 33 30 30 29 0D VA)(3004122300).
0A 46 2E 46 28 30 30 30 30 30 30 30 30 29 0D 0A .F.F(00000000)..
46 2E 46 2E 31 28 30 30 30 31 30 30 30 30 29 0D F.F.1(00010000).
0A 46 2E 46 2E 32 28 30 30 30 30 30 30 30 30 29 .F.F.2(00000000)
0D 0A 46 2E 46 2E 33 28 30 30 30 30 30 30 30 30 ..F.F.3(00000000
29 0D 0A 43 2E 33 2E 30 28 30 30 30 30 30 30 30 )..C.3.0(0000000
30 29 0D 0A 43 2E 35 36 28 30 30 33 37 32 35 29 0)..C.56(003725)
0D 0A 21 0D 0A 03 6F ..!...o
Port closed
My question: Is it possible to send the request bytes (which were found above) to the meter and then get the answer bytes and saved them on pc? Basically, is it possible to communicate with the meter by sending the hex bytes and receiving the answer? or there are some other steps that is necessary to do before sending hex bytes?
Note: My aim is to develop a basic and simpler software as the software provided with the meter.