====== tcpdump, rtmpdump ===== ===== EBS 플래시의 경우 ===== 패킷 덤프 tcpdump -i wlp3s0 -s 0 -w iradio.tcpdump 패킷 분석 tcpdump -A -n -s 0 -r iradio.tcpdump | less 'rtmp'로 검색하면 다음처럼 패킷 내용을 볼 수 있다. 16:32:17.966384 IP 172.30.1.60.57574 > 110.10.122.10.1935: (생략) connect.?..........app...iradio..flashVer...LNX 11,2,202,644..swfUrl..6http://www.ebs.co.kr/common/swf/onairPlayerDefault.swf...tcUrl..'rtmp://new_iradio.ebs.co.kr:1935/iradio..fpad....capabilities.@m........audioCodecs.@.........videoCodecs.@o........vi.deoFunction.?.........pageUrl..3http://www.ebs.co.kr/onair?channelCodeString=iradio..objectEncoding.@......... 조금 더 밑으로 가면 다음처럼 응답이 오는 걸 볼 수 있다. 16:32:18.274252 IP 110.10.122.10.1935 > 172.30.1.60.57574: Flags [P.], seq 3456:4064, ack 3614, win 181, options [nop,nop,TS val 3671586866 ecr 340094], length 608 E...za@.5.3.n z ...<.....).@..7............ ...2..0~.................................onStatus.............level...status..code...NetStream.Play.Reset..description...Playing and resetting wowz://123.111.8.5:1935/iradio/_definst_/iradiolive_m4a|wowz://123.111.8.6:1935/iradio/_definst_/iradiolive_m4a...clientid.A......... ...............onStatus.............level...status..code...NetStream.Play.Start..description...Started playing wowz://123.111.8.5:1935/iradio/_definst_/iradiolive_m4a|wowz://123.111.8.6:1935/iradio/_definst_/iradiolive_m4a...clientid.A........ isFastPlay....timecodeOffset...1548352357L.. E..........|RtmpSampleAccess................. .... rtmpdump를 통해 스트림을 받을 수 있는 준비가 되었다! rtmpdump -r rtmp://new_iradio.ebs.co.kr:1935/iradio --playpath wowz://123.111.8.5:1935/iradio/_definst_/iradiolive_m4a -o live.m4a ===== 브금저장소의 경우 ===== ===== 참고 ===== * https://pxnh.wordpress.com/2010/08/21/rtmp-retrieval-with-rtmpdump-and-tcpdump/ * http://v3gard.com/2011/10/downloading-flv-streams-using-rtmpdump/