Recent content by ACCktm79

  1. A

    Hacking Juanvision D8204-2 NVR with YES.SYS IP cameras

    I think I've located video streams! $ wget --user=root --password=root --auth-no-challenge "http://192.168.1.69/livestream/11" --2024-09-16 15:25:27-- http://192.168.1.69/livestream/11 Connecting to 192.168.1.69:80... connected. HTTP request sent, awaiting response... 401 Unauthorized Unknown...
  2. A

    Hacking Juanvision D8204-2 NVR with YES.SYS IP cameras

    Hi all, I've made some progress. Learned that these cameras are most likely Juanvision, so I changed my topic name. Secondly, I was able to obtain static snapshop JPG from the cameras! Their paths are as follows: http://192.168.1.69/snapshot.jpg Here, I can see static 488x400 JPG directly from...
  3. A

    Hacking Juanvision D8204-2 NVR with YES.SYS IP cameras

    By the way, Android app I use for this NVR is EseeCloud: https://play.google.com/store/apps/details?id=com.juanvision.eseecloud30 Cameras have "juan" word in that UDP packet, in a message blob I didn't copied in my previous post, it wasn't part of the JSON. EseeCloud has "juanvision" name in...
  4. A

    Hacking Juanvision D8204-2 NVR with YES.SYS IP cameras

    Hi all, I have chinese D8204-2 NVR with four IP cameras. Cameras have YES.SYS logo branded on them. I would like to get rid of that NVR and use cameras directly by IP, using motion or other software. So far, I have been unsuccessful with hacking the cameras. That's what got so far: NVR model...