I tried to packet capture the Night Owl Connect software but I didn't have a rooted phone handy and it had some sort of protection keeping it from working through the VPN connection. Images are horrible. I was able to get it working with iSpy using http. Lag with either Night Owl Connect or iSpy using JPEG captures of 1fps which seems to be the max?
These are captured from the Night Owl Software. Somehow they think it's 1080p!
http://127.0.0.1/snapshot <--Only URL that I've found that outputs a jpeg
PORT STATE SERVICE VERSION
80/tcp open http nginx
|_http-comments-displayer: Couldn't find any comments.
| http-headers:
| Content-Length: 213
| Content-Type: text/html
| Date:
| Server: nginx
|
|_ (Request type: GET)
| http-methods:
|_ Supported Methods: GET POST
|_http-mobileversion-checker: No mobile version detected.
|_http-referer-checker: Couldn't find any cross-domain scripts.
|_http-security-headers:
|_http-server-header: nginx
|_http-title: 404 Not Found
| http-traceroute:
|_ Possible reverse proxy detected.
| http-useragent-tester:
| Status for browser useragent: 404
| Allowed User Agents:
| Mozilla/5.0 (compatible; Nmap Scripting Engine; Chapter 9. Nmap Scripting Engine | Nmap Network Scanning)
| libwww
| lwp-trivial
| libcurl-agent/1.0
| PHP/
| Python-urllib/2.5
| GT::WWW
| Snoopy
| MFC_Tear_Sample
| HTTP::Lite
| PHPCrawl
| URI::Fetch
| Zend_Http_Client
| http client
| PECL::HTTP
| Wget/1.13.4 (linux-gnu)
|_ WWW-Mechanize/1.34
|_http-xssed: No previously reported XSS vuln.
MAC Address: 54:2B:57:xx:xx:xx (Night Owl SP)
Device type: general purpose
Running: Linux 4.X
OS CPE: cpe:/o:linux:linux_kernel:4.4.2
OS details: DD-WRT v3.0 (Linux 4.4.2)
Uptime guess: 0.260 days (since Tue Jul 23 15:19:42 2019)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: All zeros
I'll be returning this PoS. It might have actually been okay if motion alarms didn't alert all the time when set to low... It's not like I had it pointed towards a street even!
If anyone else has idea for pulling video from the device let me know. Only port that was open is 80 from what I can tell. I won't have it much longer.
It's really a piece of junk with bad software.
These are captured from the Night Owl Software. Somehow they think it's 1080p!
http://127.0.0.1/snapshot <--Only URL that I've found that outputs a jpeg
PORT STATE SERVICE VERSION
80/tcp open http nginx
|_http-comments-displayer: Couldn't find any comments.
| http-headers:
| Content-Length: 213
| Content-Type: text/html
| Date:
| Server: nginx
|
|_ (Request type: GET)
| http-methods:
|_ Supported Methods: GET POST
|_http-mobileversion-checker: No mobile version detected.
|_http-referer-checker: Couldn't find any cross-domain scripts.
|_http-security-headers:
|_http-server-header: nginx
|_http-title: 404 Not Found
| http-traceroute:
|_ Possible reverse proxy detected.
| http-useragent-tester:
| Status for browser useragent: 404
| Allowed User Agents:
| Mozilla/5.0 (compatible; Nmap Scripting Engine; Chapter 9. Nmap Scripting Engine | Nmap Network Scanning)
| libwww
| lwp-trivial
| libcurl-agent/1.0
| PHP/
| Python-urllib/2.5
| GT::WWW
| Snoopy
| MFC_Tear_Sample
| HTTP::Lite
| PHPCrawl
| URI::Fetch
| Zend_Http_Client
| http client
| PECL::HTTP
| Wget/1.13.4 (linux-gnu)
|_ WWW-Mechanize/1.34
|_http-xssed: No previously reported XSS vuln.
MAC Address: 54:2B:57:xx:xx:xx (Night Owl SP)
Device type: general purpose
Running: Linux 4.X
OS CPE: cpe:/o:linux:linux_kernel:4.4.2
OS details: DD-WRT v3.0 (Linux 4.4.2)
Uptime guess: 0.260 days (since Tue Jul 23 15:19:42 2019)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: All zeros
I'll be returning this PoS. It might have actually been okay if motion alarms didn't alert all the time when set to low... It's not like I had it pointed towards a street even!
If anyone else has idea for pulling video from the device let me know. Only port that was open is 80 from what I can tell. I won't have it much longer.
It's really a piece of junk with bad software.