So, I just got that awesome H8R.
After a couple tests to confirm everything was fine, I went to try the android "Ez iCam" app that would allow me to control the cam remotely.
Slight disappointment here, as the app was marked "Not compatible with your device" on all phones and tablets I tried it with.
Weird, especially since my phone is neither that old nor uncommon.
But that wouldn't be a problem.
I decided to reverse engineer the app to see what it was actually doing, so I can reimplement all its functions in my own python scripts or cli tools, so I could remotely operate my cam in any setup I'd see fit.
In this first post, I'll show you a basic overview of what I discovered, what the various communication blocs and protocols are, and what it means for us, wishing to make our own/better tools to interact with the H8.
Hacken
A blog dedicated to hacking, understanding,
accesorizing and improving eken sport cameras.
vendredi 27 janvier 2017
mardi 1 novembre 2016
Welcome to Hacken
So, I recently got one of those sub-100$ action cameras.
They're pretty great.
And with a little effort, we can probably get even more from them.
This blog will be dedicated to investigating those cameras inner workings, and producing various hardware mods and accessories to make them even better.
I'll try to share most of the research process so those of you wishing to learn how it's done can follow along, and hopefully come up with their own questions, investigations and solutions.
What can you expect to find there ?
Topics I'll probably cover in a near future include:
Hope you will find the information here useful, and that it will help you better understand and expand your and your cameras' capabilities.
They're pretty great.
And with a little effort, we can probably get even more from them.
This blog will be dedicated to investigating those cameras inner workings, and producing various hardware mods and accessories to make them even better.
I'll try to share most of the research process so those of you wishing to learn how it's done can follow along, and hopefully come up with their own questions, investigations and solutions.
What can you expect to find there ?
Topics I'll probably cover in a near future include:
- Reverse engineering the phone app behaviour, and replicating it inside our own free and open python scripts or command line tools, that will work from any PC, phone raspberry or whatever.
- Maybe uncovering some hidden functions along the way ? ;)
- Better understanding of the low level protocols used by the camera, its remote and app.
- This should allow us to interface the camera with more common and open tools for video streaming, file retrieval, use as a surveillance cam etc.
- Reverse engineering the 2.4 ghz remote operation, so we can make our own hardware to operate the camera remotely.This could allow for more operation modes, such as motion detecting animal picture-traps.
- Modifying the camera to record infrared light
- Making various kinds of mounts, gigs and contraptions to get the best of your cam in every situation. Think custom mounts, moving time lapses, image stabilisation, unusual POVs ...
Hope you will find the information here useful, and that it will help you better understand and expand your and your cameras' capabilities.
Libellés :
app,
eken,
engineering,
ftp,
h8,
h8r,
picture transfer protocol,
protocol,
ptp,
reverse,
reversing,
rtsp
Inscription à :
Articles (Atom)