Help me reverse engineer a cloud iptv cctv camera so i can use it locally without needing its app or its cloud;
This is the camera: https://www.amazon.de/-/en/gp/product/B0BXNM48TD/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8&psc=1
This is it's app: https://play.google.com/store/apps/details?id=shix.vi.camera&hl=en&gl=US
This app works aswell: https://play.google.com/store/apps/details?id=shix.cam365.camera&hl=en&gl=US
From what i have seen in traffic logs it connects to a bunch of chinese servers using TCP;
This is info for the camera from Advanced Port Scanner:
- Hostname: rtthread
- MAC: 00:02:02:30:40:47
- Manufacturer: Amino Communications, Ltd.
- Open Ports:
- Port 23 (TCP)
- Port 10002 (TCP)
- Port 10003 (TCP)
ipcam.pcapng package capture of the android app (Taken with https://emanuele-f.github.io/PCAPdroid/):
- Parsed: https://apackets.com/pcaps?pcap=647c19eceb8027d775b1cc37a85ce833.pcapng&view=charts
- Raw: https://apackets.com/api/v1/pcaps/public/download/647c19eceb8027d775b1cc37a85ce833.pcapng/ipcam.pcapng
I found this homeassistant thread by using reverse engineered code of the android app which seems to discuss cameras working the same way as mine: https://community.home-assistant.io/t/popular-a9-mini-wi-fi-camera-the-ha-challenge