Hi Ross,
I have a lot of fun in reverse engineer IPCams - i have telnet access passwords to many of them. If you need some - just ask.
Marcin

W dniu 2014-10-31 16:21, Ross Finlayson pisze:
# ifconfig
eth0      Link encap:Ethernet  HWaddr EC:71:DB:2F:23:E6
          inet addr:50.0.150.53  Bcast:50.0.150.255 Mask:255.255.255.0
          inet6 addr: 2001:470:82e9:1:ee71:dbff:fe2f:23e6/64 Scope:Global
          inet6 addr: 2001:470:82e9:0:ee71:dbff:fe2f:23e6/64 Scope:Global
          inet6 addr: fe80::200:23ff:fe34:4566/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500 Metric:1
          RX packets:80844 errors:0 dropped:0 overruns:0 frame:0
          TX packets:96361 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:5525623 (5.2 MiB)  TX bytes:7345725 (7.0 MiB)
          Interrupt:12

Nice.  How were you able to get shell access?

In any case (as I noted in my last email), I was able to find a working URL:
rtsp://<ip-address>/h264Preview_01_main


Ross Finlayson
Live Networks, Inc.
http://www.live555.com/



_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel

_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel

Reply via email to