![]() For the sake of the analysis, there’s no practical difference since they all use the same protocol. There are several client applications available to choose from, both mobile and desktop. Once we established that we could access the cleartext communications between the NVR and the Reolink P2P server, it was time to bring a P2P client into the picture. Communication Between the P2P client and the Reolink P2P Server The first three packets of the UDP payload are revealed using a small script and the hardcoded key identified by our team.Īccessing the cleartext protocol was the first building block that allowed us to develop an understanding of the operations performed by the P2P server. What follows is the output obtained with the first three packets: nvr:46469 -> :9999 The most obvious next step was crafting a small script that tried to reveal the UDP payload with the key we had just identified. From there we found the code that performs the obfuscation using a hardcoded key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |