Ask Your Question
0

(NEWBE) Capturing video from action camera

asked 2019-05-15 15:42:38 +0000

brid030 gravatar image

updated 2019-05-15 16:41:03 +0000

grahamb gravatar image

First time user here. I'm trying to understand communication between a wifi enabled action camera and an iPhone so that I can ultimately use a Raspberry Pi to access an image stream (and do other stuff). There's no documentation for the camera--just a phone app. I figured out how to intercept communication between the camera and the phone, but it was not what I expected. So when I start streaming video to the phone, there's some apparent handshaking...

24  1.052588    192.168.100.103 192.168.100.1   TCP 64  49562 → 80 [SYN, ECN, CWR] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=642791644 TSecr=0 SACK_PERM=1

27  1.056961    192.168.100.1   192.168.100.103 TCP 60  80 → 49562 [SYN, ACK, ECN] Seq=0 Ack=1 Win=14480 Len=0 MSS=1460 SACK_PERM=1 TSval=123542 TSecr=642791644 WS=32

...and then the presumed video frames get interpreted as a SKYPE protocol...

210 12.111497   192.168.100.1   192.168.100.103 SKYPE   1036    Fragment/Forward/Resend

Can anyone tell me if there is hope for being able to emulate the phone with an RPi. If so, what should I do next?

The capture session is posted here: https://osf.io/3bpc8/

I would attach my capture session but I don't have any user points for this site. The phone has IP address 192.168.100.103 and the camera is 192.168.100.1

Thanks for any help.

edit retag flag offensive close merge delete

Comments

Go into 'Enabled protocols' and disable 'skype_udp'. It's probably off by default, since its heuristics are somewhat weak giving false positives.

Jaap gravatar imageJaap ( 2019-05-16 05:58:01 +0000 )edit

1 Answer

Sort by » oldest newest most voted
0

answered 2019-05-16 06:04:04 +0000

Jaap gravatar image

You'll have to look very carefully at the TCP packets being exchanged between iPhone and camera. Some of these packets contain clear text info, others are encoded otherwise. See what you can figure out from the text, and try to infer the contents of the other packets from there. At least it won't be a problem finding the password.

edit flag offensive delete link more

Comments

Thanks for the answer and comment. I disabled Skype_udp and the packets were then recognized as MNDP. I then disabled MNDP_upd and they now show up as just UDP packets. I looked into the TCP packets a bit, but I don't know what I'm looking at...need to read up on how to interpret them. Early on in the exchange I found "accept -Encoding Gzip." So maybe the packets are images in a compressed format??

brid030 gravatar imagebrid030 ( 2019-05-17 16:37:42 +0000 )edit

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account.

Add Answer

Question Tools

1 follower

Stats

Asked: 2019-05-15 15:42:38 +0000

Seen: 489 times

Last updated: May 16 '19