Replies: 3 comments 19 replies
-
So this became more complicated recently with the release of AES encryption which wireshark has no easy way to deal with. If you use a modern client and a camera with the newest firmware it will all show as binary because wireshark can't decide the AES. To confirm this have a look at the 01 login sequence bytes 17-18 of the header of the legacy login will be either 01dc or 03dc. The reply will be either 00dd 01dd or 02dd. If the reply is 02dd then wireshark can't read it. In such a case I recommend you try and find and old reolink client app from last year and use that for your testing or downgrade the firmware of your camera. |
Beta Was this translation helpful? Give feedback.
-
I am not finding any of those byte sequences, but am sill learning how
to oriant myself I WS but I get two login event every time.
One legacy and one modern, BIACHUAN and BIACHUAN XML protocol.
I have an E1 Pro, but if I downgrade is the same protocol in use?only encrypted? So if I manage to push the audio stream, it should still work with an updated camera?
Does every camera have its own Public/private
key or is Reolink clue involved somehow or hardcoded?
…On Tue, Jul 27, 2021 at 2:37 AM Andrew King ***@***.***> wrote:
My PR #152 <#152> incudes
updated documentation that goes into more detail of this login sequence
maybe have a read or the files changed in that PR.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#182 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAKP5LY3JSDWLD2OYSLBD7DTZX5ULANCNFSM5BBBILNA>
.
|
Beta Was this translation helpful? Give feedback.
-
Hi, I have a fun project am working on, and as a part of this, I need to add push to talk to my Neolink build. So this if my first intro to try and learn reversing.
So am starting with learning WireShark and to start I'm tackling something smaller. But am already in over my head
Am trying to figure out the "flip camera" button in the Reolink client for myselfe just to understand the process, but I could use some pointers.
When I open WireShark and record this action of the Official Reolink Client.
Its is listad as type: (Write), 25
But the Main Payload is marked as Binary, and no XML is visible, what would be the next step to find out what was actually sent?
So I need to Decompile the client? Or could I possibly view this info if i extend the lua WS plugin?
Am completely green to this, so feel free to use small words :D
Beta Was this translation helpful? Give feedback.
All reactions