Awesome
THIS PROJECT IS OUTDATED AND NOT MAINTAINED ANYMORE
yi-hack-v2 project
Special thanks go to fritz-smh : https://github.com/fritz-smh/yi-hack
This yi-hack-v2 project is totally inspired from its own project.
Purpose
This project is a collection of scripts and binaries file to hack your Xiaomi Yi Ants Camera 2.
This camera has the default following features :
- wifi
- motion detection : a video file is generated if a motion have been detected in the last 60 seconds.
- send video data over the network on Chinese servers in the cloud to allow people to view camera data from their smartphone wherever they are.
- setup thanks to a smartphone application.
- local video storage on a SD card
- no RTSP server
This hack includes :
- Base firmware : 2.1.1_20160429113900
- Telnet server activated
- FTP server activated
- Ability to make a "China only" camera work outside China
- Ability to choose voice between Chinese, English and French
- Ability to choose timezone and format of date/time embedded in the video
In early alpha stage :
- Ability to disable Chinese cloud
- Ability to activate RTSP server
Warning about some models that are usable only in China
My camera is a CN model, thus it can't be paired with a smartphone outside China.
Thanks to https://diy.2pmc.net/solved-xiaomi-xiao-yi-ant-home-camera-can-used-china/ an old firmware (2.1.1_20160429113900) is available and make this CN model pairable with an Android device app (http://app.mi.com/detail/75646). It can also be paired with an iOS device if you succeed in installing Yi Home from Chinese App Store (tutorial is coming soon).
The firmware comes from http://yi-version.qiniudn.com/@/familymonitor-h21/2.1.1_20160429113900home
Warning, even if a chinese camera can be paired with your device, the application will fail with a -20009 network error code. This is due to recent changes on Xiaomi servers which prevent chinese cameras to work outside China.
If you own a chinese camera, you can now use a custom proxy server to make Xiaomi servers think you are located in China. Special thanks to shadow-1 who has made really great job for previous camera models (https://github.com/shadow-1/yi-hack-v3).
To activate the proxy server, you need to modify test/yi-hack-v2.cfg, uncomment and fill the YI_HACK_PROXY line. Of course, you need to find a working proxy in China.
Installation on the YI camera
The memory card must stay in the camera ! If you remove it, the camera will start without using the hack.
Prepare the memory card
Clone this repository on a computer :
git clone http://github.com/niclet/yi-hack-v2.git
Then, format a micro SD card in fat32 (vfat) format and copy the content of the yi-hack-v2/sd/ folder at the root of your memory card.
The memory card will so contain :
- home.bin : the official firmware file compliant with CN model
- test : the folder which contains the hack scripts and binaries
Start the camera
- If plugged, unplug the Yi camera
- Insert the memory card in the Yi camera
- Plug the Yi camera
- Follow instructions to pair with your mobile app. This is only needed the first time.
The camera will start. The led will indicate the current status :
- yellow : camera startup
- blue blinking : network configuration in progress (connect to wifi, set up the IP address)
- blue : network configuration is OK. Camera is ready to use.
How can I know which is the version of a firmware 'home.bin' file ?
Just do : strings home.bin | grep YUNYI_VERSION. Example :
$ strings home.bin | grep YUNYI_VERSION
YUNYI_VERSION=2.1.1_20160429113900
Use the camera
Telnet server
The telnet server is on port 23.
No authentication is needed, default user is root.
FTP server
The FTP server is on port 21.
No authentication is needed, you can use anonymous user.
RTSP server
To activate the RTSP server, you need to modify test/yi-hack-v2.cfg and uncomment the line YI_HACK_STARTUP_MODE=MODIFIED
You must also modify test/wpa_supplicant.conf to be compliant with your own wifi network.
Please note that when you activate RTSP server, you can't use your mobile app anymore.
During camera startup, the led will indicate the current status :
- yellow : camera startup
- blue blinking : network configuration in progress (connect to wifi, set up the IP address)
- blue : network configuration is OK. Camera is ready to use.
- red : network configuration is KO. You should check your test/wpa_supplicant.conf file.
Main stream is available from rtsp://<IP>/stream1
A secondary MJPEG stream is also available from rtsp://<IP>/stream2
Following hostmit suggestion, you can now use test/v2/scripts/capture.sh to capture a single frame as a JPG file.
I want more !
For now, it is just a kind of proof of concept. Many work has still to be done.
Coming soon !
Connection to wifi without Android app is in progress. RTSP server is also in progress, this will be the more important and difficult part.
How it works ?
Hack content
home.bin Official firmware 2.1.1_20160429113900
test/ Yi hack folder
factory_test.sh This script is called on camera startup and will launch all the needed processes
logs/
factory_test.log Log file of the hack (filled by factory_test.sh)
v2/
audio/
fr/
* French voice files
bin/
libyihackv2.so Native library to provide hacked features
tcpsvd TCP Service Daemon (http://smarden.org/ipsvd/index.html) to launch FTP Server (ftpd)
scripts/
capture.sh This script lets capture a single frame as a JPG file
led.sh This script lets manipulate the led state
startup_modified.sh This script is called from factory_test.sh when MODIFIED startup (aka RTSP server) is activated
startup_official.sh This script is called from factory_test.sh when OFFICIAL startup is activated
wpa_supplicant.conf This config file must be correctly filled to connect the camera to your wifi network when RTSP feature is enabled
yi-hack-v2.cfg This config file lets you tune up various behaviors
factory_test.sh
TODO