Recent content by hacksweden

  1. H

    Accessing the P2 wifi repeater and camera

    Yeah, the video data is definitely encapsulated in http://udt.sourceforge.net/udt4/ (UDT - UDP-based Data Transfer). I had a look at the process "server" running on the camera at 192.168.1.10 and it has mapped a library called "/usr/lib/libudt.so" according to /proc/<pid>/maps. There are also...
  2. H

    Accessing the P2 wifi repeater and camera

    Yeah, I'm on a P2V+ with the latest firmware made available as of July, 2014. Interesting to see that there's different password on the P2V. Yeah, the killall stuff comes from the read_proc process. root@Dji-Pro:/opt/ti# ps |grep read_proc 408 root 0:17 ./read_proc 505 root...
  3. H

    Other Free Vision+ Range Booster it works that good?

    Happy to see others looking into this as I too would like be able to access the telemetry data outside of the app. I've posted a few of my own findings in Accessing the P2 wifi repeater and camera.
  4. H

    Accessing the P2 wifi repeater and camera

    From a few of sample sessions, I've grouped the ser2net packets on what I believe is the command byte at offset 6 (byte #7) and then noted changed nibbles with a dot. Each packets begins with a header (two bytes magic [0x55, 0xbb], length, unknown, two bytes sequence number, command byte)...
  5. H

    Accessing the P2 wifi repeater and camera

    OK, so I've spent a few hours sniffing the ser2net communication on port 2001 between the DJI Vision app (iOS for me) and the camera instance at 192.168.1.1. It looks like it is a request - response protocol, with the client making the requests. Each packet consists of a header, some data and...
  6. H

    Accessing the P2 wifi repeater and camera

    The root password for system #3, the "DJI-Pro" camera at 192.168.1.10, is: 123456 root@Dji-Pro:~# uname -a Linux Dji-Pro 2.6.32.17-davinci1 #6 PREEMPT Wed Apr 9 05:21:55 PDT 2014 armv5tejl GNU/Linux root@Dji-Pro:~# cat /proc/cpuinfo Processor : ARM926EJ-S rev 5 (v5l) BogoMIPS ...