我試圖直接連接到IP視頻服務器(「諾歐」IP服務器)的視頻流。在Wireshark中解碼URL
他們的說明手冊給出了'home'的URL - 一個安裝了一個可愛的小型activeX控件的頁面,用於處理與實際視頻服務器的所有交互。
我需要該內部服務器的URL。 [我不需要由ActiveX控件提供的附加控件,並且在Internet Explorer不可用的環境中。我只是想流]
我試過Wireshark,它捕獲所有的數據包,但沒有告訴我不同頁面的完整URL。 [即:如果物理設備是212.234.56.456,它顯示相同的URL是否連接到主頁(212.234.56.456/home.html),視頻服務器(可能類似於212.234.56.456/video.amp )或設備內的任何其他內容。]
儘管頭疼不已,並且搜索他們的網站和手冊,但我無法理解如何獲取服務器的整個URL。
有人可以請我指導一個教程或指導頁 - 或只是拼出如何做到這一點?
Wireshark的並不一定是解決辦法 - 我會很高興用別的東西(嘗試提琴手,但不知道它配置 - 默認情況下它捕獲這個沒有交通)
感謝
編輯: 協議是TCP
視頻端口:8000 [在服務器中有一個選項來更改端口。默認是8000]
我想連接到視頻流使用類似VLC或RealPlayer [爲了重新流]而不是它所附帶的ActiveX控件。 我不知道有關TCP的任何信息,除了它顯示在附加的數據包中。 該服務器正在編碼爲MPEG 4 [h.264],並且應該是流式傳輸RTSP://
我已經讀過很多人用Axis服務器成功完成這項工作(它們連接到rtsp:// [server -ip-address]:554/axis-media/media.amp with VLC)以及Arecont Server(rtsp:// [server-ip-address] /h264.sdp)。很明顯,我們使用的Nuuo服務器上並不存在此頁面,該頁面旨在與Axis設備競爭。
我加載了頁面,啓動Wireshark,然後按下ActiveXControl上的播放按鈕(啓動視頻)。下面是所述第一分組的Wireshark捕獲[許多的,它是用於該視頻的請求]:
No. Time Source Destination Protocol Info
53 7.198090 192.168.1.4 212.143.234.227 TCP 4734 > irdmi [SYN] Seq=0 Win=65535 Len=0 MSS=1460
Frame 53 (62 bytes on wire, 62 bytes captured)
Arrival Time: Jul 8, 2009 13:24:35.008644000
[Time delta from previous captured frame: 0.048542000 seconds]
[Time delta from previous displayed frame: 7.198090000 seconds]
[Time since reference or first frame: 7.198090000 seconds]
Frame Number: 53
Frame Length: 62 bytes
Capture Length: 62 bytes
[Frame is marked: False]
[Protocols in frame: eth:ip:tcp]
[Coloring Rule Name: TCP SYN/FIN]
[Coloring Rule String: tcp.flags & 0x02 || tcp.flags.fin == 1]
Ethernet II, Src: Intel_66:1e:41 (00:19:d1:66:1e:41), Dst: GigasetC_49:05:10 (00:21:04:49:05:10)
Destination: GigasetC_49:05:10 (00:21:04:49:05:10)
Address: GigasetC_49:05:10 (00:21:04:49:05:10)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: Intel_66:1e:41 (00:19:d1:66:1e:41)
Address: Intel_66:1e:41 (00:19:d1:66:1e:41)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.4 (192.168.1.4), Dst: 212.143.234.227 (212.143.234.227)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 48
Identification: 0x816c (33132)
Flags: 0x04 (Don't Fragment)
0... = Reserved bit: Not set
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 128
Protocol: TCP (0x06)
Header checksum: 0xf83b [correct]
[Good: True]
[Bad : False]
Source: 192.168.1.4 (192.168.1.4)
Destination: 212.143.234.227 (212.143.234.227)
Transmission Control Protocol, Src Port: 4734 (4734), Dst Port: irdmi (8000), Seq: 0, Len: 0
Source port: 4734 (4734)
Destination port: irdmi (8000)
[Stream index: 3]
Sequence number: 0 (relative sequence number)
Header length: 28 bytes
Flags: 0x02 (SYN)
0... .... = Congestion Window Reduced (CWR): Not set
.0.. .... = ECN-Echo: Not set
..0. .... = Urgent: Not set
...0 .... = Acknowledgement: Not set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..1. = Syn: Set
[Expert Info (Chat/Sequence): Connection establish request (SYN): server port irdmi]
[Message: Connection establish request (SYN): server port irdmi]
[Severity level: Chat]
[Group: Sequence]
.... ...0 = Fin: Not set
Window size: 65535
Checksum: 0x378c [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Options: (8 bytes)
Maximum segment size: 1460 bytes
NOP
NOP
SACK permitted
什麼端口上?信息包是什麼樣的? – MiffTheFox 2009-07-08 11:58:27