dumping Ilive.toHey guys,
Do you know how to dump ilive.to streamings? It used to be possible to dump the streams getting a token from http://www.ilive.to/server.php but not anymore. Although it's still possible to get a token the server closes the connection. Code:
rtmpdump -r rtmp://live.iguide.to/edge -y vsoui5hx1do3qon -W http://player.ilive.to/secure_player_ilive_z.swf --token "UYDk93k#09sdafjJDHJKAD873" --live --debug -p "http://www.ilive.to/view/49959/watch-live-SIC_Noticias-streaming-channel-for-free" |
Re: dumping Ilive.totry with
Code:
-T "I8772LDKksadhGHGagf#" |
Re: dumping Ilive.totest that
Code:
--token "I8772LDKksadhGHGagf#" |
Re: dumping Ilive.toThanks @KSV
Is the token from the server.php response modified in the swf file? |
Re: dumping Ilive.toI answer myself. The token is obfuscated inside the swf.
I take the opportunity to ask you guys, how did you find the token? deobfuscating the swf? Or somehow you've found a method to reverse the process: Recieve SecureToken()--->DecodeTEA()--->SendSecureResponse() Thanks |
Re: dumping Ilive.toI mostly just signed up to say thanks! The token from server.php still worked a few days ago; now it doesn’t seem to be as easy anymore.
In another thread, oelk said that you can find the token either by manipulating the code to output the calculated token, by using a debugger, or by using a “decryption” function in one’s own code. Now I would like to be able to extract these tokens myself, but while I’m a software dev, I’m not versed in ActionScript/Flash programming. Are there any how-to guides, preferably for Linux, that describe the process? I’ve seen people in other threads ask the same question, but the search doesn’t seem to produce anything of the sort. |
Re: dumping Ilive.toI've been thinking on it and I guess the most simple, feasible way would be to dissamble the swf put a "print" and assemble again.
For example in ilive.to's swf file we can see in assembly code: Code:
43 getproperty info //nameIndex = 249 Making a wild guess as I'm dont know match about actionscript translates to something like: Code:
_connection.call("secureTokenResponse", null, TEA.decrypt(evt.info.secureToken, _a_-_---(-1820302793))); @Telofy I also work in linux and unfortunately there isn't much, you can try JPEXS Decompiler though. The best I've found it's Adobe swf investigator http://labs.adobe.com/technologies/swfinvestigator/ |
Re: dumping Ilive.toHmmhmm, JPEXS is what I used, and it gives me:
Code:
if(evt.info.secureToken != undefined) Code:
package There were several “severe” errors during the decompilation, so I doubt the result plus print command could be recompiled again. Disassembling it seems like a good idea. |
Re: dumping Ilive.toThe decompiled “_a_-_---.as” from JPEXS doesn't make much sense at least for me. I've been playing with the deobfuscated functions/classes from JPEXS in a flex compiler and the result is that:
(Following the flow of) Code:
if(evt.info.secureToken != undefined) Code:
public static function _a_--_--(param1:int) : String { Code:
private static function _a_-_--() : void { Code:
_a_-- = _loc3_.readInt(); Next thing I'll try it's dissamble-->assemble with https://github.com/CyberShadow/RABCDAsm. Ideas Welcome. |
Re: dumping Ilive.toWell even though, my idea is going down a different path than you folks, I somewhat have found a way to get a fresh copy of the token on-the-fly.
I was looking at svnpenn's Hulu.sh script which takes a Hulu video url into Firefox, memory dumps it, then searches said dump for parameters. I noticed you can do the exact same thing with ilive and the token is in the dump, but I currently am having issues with the regex to spit out the token to place in rtmpdump. It appears the token is always before the words "Connection succeeded" so I should just need a regex that says "give me the alphanumeric with some symbols string right before Connecton succeeded". I using gawk, sed, curl, wget, etc having my script already getting the tcURL, swfurl, & playpath. I know this isn't the greatest in the world way of doing it, but I know it's possible at least. |
All times are GMT -6. The time now is 06:31 PM. |