First time here? Check out the FAQ!
THIS IS A TEST INSTANCE. Feel free to ask and answer questions, but take care to avoid triggering too many notifications.
0

(NEWBE) Capturing video from action camera

First time user here. I'm trying to understand communication between a wifi enabled action camera and an iPhone so that I can ultimately use a Raspberry Pi to access an image stream (and do other stuff). There's no documentation for the camera--just a phone app. I figured out how to intercept communication between the camera and the phone, but it was not what I expected. So when I start streaming video to the phone, there's some apparent handshaking...

24  1.052588    192.168.100.103 192.168.100.1   TCP 64  49562 → 80 [SYN, ECN, CWR] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=642791644 TSecr=0 SACK_PERM=1

27  1.056961    192.168.100.1   192.168.100.103 TCP 60  80 → 49562 [SYN, ACK, ECN] Seq=0 Ack=1 Win=14480 Len=0 MSS=1460 SACK_PERM=1 TSval=123542 TSecr=642791644 WS=32

...and then the presumed video frames get interpreted as a SKYPE protocol...

210 12.111497   192.168.100.1   192.168.100.103 SKYPE   1036    Fragment/Forward/Resend

Can anyone tell me if there is hope for being able to emulate the phone with an RPi. If so, what should I do next?

The capture session is posted here: https://osf.io/3bpc8/

I would attach my capture session but I don't have any user points for this site. The phone has IP address 192.168.100.103 and the camera is 192.168.100.1

Thanks for any help.

brid030's avatar
1
brid030
asked 2019-05-15 15:42:38 +0000
grahamb's avatar
23.8k
grahamb
updated 2019-05-15 16:41:03 +0000
edit flag offensive 0 remove flag close merge delete

Comments

Go into 'Enabled protocols' and disable 'skype_udp'. It's probably off by default, since its heuristics are somewhat weak giving false positives.

Jaap's avatar Jaap (2019-05-16 05:58:01 +0000) edit
add a comment see more comments

1 Answer

0

You'll have to look very carefully at the TCP packets being exchanged between iPhone and camera. Some of these packets contain clear text info, others are encoded otherwise. See what you can figure out from the text, and try to infer the contents of the other packets from there. At least it won't be a problem finding the password.

Jaap's avatar
13.7k
Jaap
answered 2019-05-16 06:04:04 +0000
edit flag offensive 0 remove flag delete link

Comments

Thanks for the answer and comment. I disabled Skype_udp and the packets were then recognized as MNDP. I then disabled MNDP_upd and they now show up as just UDP packets. I looked into the TCP packets a bit, but I don't know what I'm looking at...need to read up on how to interpret them. Early on in the exchange I found "accept -Encoding Gzip." So maybe the packets are images in a compressed format??

brid030's avatar brid030 (2019-05-17 16:37:42 +0000) edit
add a comment see more comments

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account. This space is reserved only for answers. If you would like to engage in a discussion, please instead post a comment under the question or an answer that you would like to discuss.

Add Answer