Now without wireshark:
Code:
./rtmpdump -W ($swfUrl) -s ($swfUrl) -a ($app) -f ($flashVer) -t ($tcURL) -r ($tcUrl)/mfc_10($ModelID) -p ($pageUrl)&objectEncoding=0 -C N:($SessionID) -C S:($Password) -C N:10($ModelID) -C S:DOWNLOAD -C N:($ModelID) -o output.flv -v
Constant parameters
Code:
- app: NxServer
- flashVer: LNX 10,2,161,23
- swfUrl: http://www.myfreecams.com/mfc2/flash/MfcVideoBeta.swf?nc=33
- password: check your browser cookie 'passcode'
- pageUrl: http://www.myfreecams.com/mfc2/static/player.html?
Variable parameters
- tcUrl: you can get it just by listening port 1935 with lsof: 'lsof -rPi tcp:1935 -F n'
- ModelID : 'curl -s http://profiles.myfreecams.com/ModelName | grep -oP 'admireUser\(\d{7}\)' | grep -oP '\d{7}'
- SessionID is available in Chrome Browser Console (Inspect Page, Show Console).
Code:
XHR finished loading: "http://www.myfreecams.com/mfc2/php/client_info.php?r=971378&uid=15273321683852&tz=1&username=AnUsername&passcode=&co=1224851467203&sz=1920x1080&session_id=54828537&sCrcSystemInfo=-445883272&sCrcSystemBroad=-9919407&sCrcSystemFonts=-1924852102&sCrcSystemFontsSorted=270372655&flashver=10.2.0&connection_completed=1".
Or use Firebug extension with firefox (in the panel, Network>XHR).