Hi Ross,
I have a lot of fun in reverse engineer IPCams - i have telnet access
passwords to many of them. If you need some - just ask.
Marcin
W dniu 2014-10-31 16:21, Ross Finlayson pisze:
# ifconfig
eth0 Link encap:Ethernet HWaddr EC:71:DB:2F:23:E6
inet addr:50.0.150.53 Bcast:50.0.150.255 Mask:255.255.255.0
inet6 addr: 2001:470:82e9:1:ee71:dbff:fe2f:23e6/64 Scope:Global
inet6 addr: 2001:470:82e9:0:ee71:dbff:fe2f:23e6/64 Scope:Global
inet6 addr: fe80::200:23ff:fe34:4566/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:80844 errors:0 dropped:0 overruns:0 frame:0
TX packets:96361 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:5525623 (5.2 MiB) TX bytes:7345725 (7.0 MiB)
Interrupt:12
Nice. How were you able to get shell access?
In any case (as I noted in my last email), I was able to find a
working URL:
rtsp://<ip-address>/h264Preview_01_main
Ross Finlayson
Live Networks, Inc.
http://www.live555.com/
_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel
_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel