Secure token issueHello everyone!
I'm trying to catch rtmpe streams from the site mybeststream.xyz So far, I haven't got problems to capture streams from this platform. But since a few days, something has changed (I guess they must have added some token) Here is an example: Code:
rtmpdump -v -r "rtmpe://l.mybeststream.xyz/r/" -a "r/" -y "dolcehdw619" -W "http://mybeststream.xyz/MjJiYmQ3MjI0ZWVkZTYzZmNlYTkzM2M0OTcyZjVhMGZlMzAzN2/jwplayer.flash.swf" live=1 -p "http://mybeststream.xyz/gen_s.php?id=27281&width=710&height=440" Once this stream worked nicely. Now, instead, I systematically get the error message "RTMP_ReadPacket, failed to read RTMP packet header" (typical error due to secure tokens) Likewise, all the other streams from this platform don't work anymore for the same issue. Any help (you can send me a pm, if you like) would be appreciated. Thanks in advance! P.S: notice that the SWF path changes dynamically. So if you need to analyze the swf file, I have uploaded it here: http://speedy.sh/sw8RR/jwplayer.flash.swf |
Re: Secure token issueHahah I like to see the people crying now trying to fuck my servers bandwidth for restream or KODI :cool:
Good luck trying to rip my streams now. ;) |
Re: Secure token issueQuote:
|
Re: Secure token issue![]() Code:
rtmpdump -r "rtmpe://l.mybeststream.xyz/r/" -a "r/" -f "WIN 18,0,0,232" -W "http://mybeststream.xyz/YjdlYTI1ZjM5ZGRiYThhNmQ1NzRkM2IzNDQxY2UxNDZlY2Q2NW/jwplayer.flash.swf" -p "http://mybeststream.xyz/gen_s.php?id=27281&width=710&height=440" -y "dolcehdw619" -T "ovcast_live_streaming" | "C:\Program Files (x86)\VideoLAN\VLC\vlc.exe" - |
Re: Secure token issueQuote:
![]() |
Re: Secure token issueQuote:
|
Re: Secure token issueQuote:
and again good job! |
Re: Secure token issueQuote:
|
Re: Secure token issueQuote:
What are you using there to find it if you dont mind me asking? |
Re: Secure token issueQuote:
if you look the flash within you'll see that the token is computed so: private var _typeOfServerAccepted:String = "937a417fd8b8aaa672743035cd18f1d9b31c82f628c1600f" ; _typeOfServer = TEA.decrypt(_typeOfServerAccepted,"0x0000"); "937a417fd8b8aaa672743035cd18f1d9b31c82f628c16 00f" as securetoken "0x0000" as key. not 100% sure how denobis found the 937a417xxx part. |
All times are GMT -6. The time now is 06:12 AM. |