To continue with the disassembly frenzy that began with ilive.to
http://stream-recorder.com/forum/dum...ve-t16652.html. I've managed to get the obfuscated token from the coolsport's swf file. BUT somehow it's not working.
This is the token I'm getting:
Although:
Code:
rtmpdump -r rtmp://rtmp.featve.com:1935/redirect -W "http://97ff0e7e610f20512dbe-483e6ce63d68aeb3d05af6c054efb801.r29.cf1.rackcdn.com/atdedead.swf" -p "http://featve.com/player3.php?id=20829&width=640&height=460" --live --debug -y 20829 --token "#atd%#$ZH"
It's not working.
Could it be that they have modified TEA.class inside the swf file so it's not an standard TEA decryption?
PS: I can provide more details on how I got the token so we can discuss this further