Obfuscated tokenHi all! I'm trying to catch one of the free streams of football-hd.com
Unfortunately it looks like - besides the wowza protection changing every 5 minutes - these rtmp streams have also a token parameter, which is obviously obfuscated...:rolleyes: Here is the structure of one of the free streams: Code:
rtmpdump -r "rtmp://free-tv.football-hd.com:1935/hdedge/" -a "hdedge/" -f "WIN 15,0,0,152" -W "https://football-hd.com/resources/player/jwplayer/jwplayer-6.10/jwplayer.flash.swf" -p "https://football-hd.com/?r=live-channel/25/2/True_Sport_HD4" -y "TRUEHD4_800?wmsAuthSign=[hash]" -T [obfuscated token] -o "test.flv" Do anyone happen to know the obfuscated token value (T) ? Also feel free to pm it, if you like. Thanks in advance! |
Re: Obfuscated tokenciao Amigo :D
for token you can use that here Code:
-T "e39d5b0a7a8a37c8/" for wmsAuthSign=xxxx at the moment not possible from my side experts welcome :D |
Re: Obfuscated tokenHi,
so you can also use only -y "TRUEHD4_800" and I don't think that the rest after is important.The channel does already play more than 20 minutes for me now with same datas. Token you can find in memory.Just check for the strings you can see below. Code:
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F |
Re: Obfuscated tokenThank you, that's even better! Yes, when I noticed the rtmp stream built with token & wowza, I imagined the real issue was the token :)
But I was not good in finding obfuscated tokens :D |
All times are GMT -6. The time now is 01:40 PM. |