Play audio on your V380 camera because why not
Note
I've only tested this with V380 cameras that use Version 3, 31, and 32. It is very likely that it will fail on other versions. It will tell you what version your camera uses once you've successfully sent a login request. Having correct credentials is not required to get the version number.
Make sure you have Python 3.9 and uv installed
- Clone this repo
cdto wherever you have it- Run
uv run main.pyto install dependencies (if missing) and run the program
- Place your audio files in a subfolder called
audio. It should be in 16-bit 8khz Mono WAV format. - Create a file
data.yamland populate it with your camera data. You can refer todata.EXAMPLE.yamlfor the format. - Run the program. You can select multiple cameras, and select an audio file to play.
Run uv run extract_creds.py to find the specific credentials used for your camera. It's not actually the same as the one you use to login to the app itself, especially on Version 32. An easy way to do this is to install PCAPdroid and V380 on an Android phone.
- Set V380 as a target app in PCAPdroid
- Press "Ready" to start tracking
- Open V380 and then open up your desired camera
- Go back to PCAPdroid and stop the tracking
- Find the request in the connections tab. It's on TCP port 8800, and make sure you're also connecting to the camera in LAN mode. In the payload tab, look at the first request and see if it starts with
8f 04. If it does, that's the correct file. Press on the download icon and selectRaw bytes. - On your PC, run
uv run extract_creds.pyand paste the location of that file. - It should print out the username and password. You can add these to
data.yaml
This program was made possible thanks to the following tools and resources. Do check them out if you want to dive into reverse engineering Android apps.