我姐姐要我救人 http://esewingworkshop.com/video-lesson/overview-zipper-types flash视频& 更多用于离线观看目的,并问我如何保存它。
我立即在firefox中发射了firebug,但令人惊讶的是视频源不是 在请求中。 http://hwcdn.net/m7n9i8d5/fms/videos/5_Standard_Zipper/B_Overview_of_Zipper_Types.flv.smil 是最后一个请求。回应是:
<smil>
<head>
<meta base="rtmp://fms006.lo1.hwcdn.net/m7n9i8d5/_definst_">
</head>
<body>
<video
src="fms/videos/5_Standard_Zipper/B_Overview_of_Zipper_Types?doppl=965d6485db1d06d2&dopsig=867922856d781b57521a1dd3f7c28c5b"></video>
</body>
</smil>
所以,我使用rtmp
流媒体协议。我试图弄清楚它的来源
这个流。我使用“wireshark”并分析流量并遵循TCP
流
POST http://fms006.lo1.hwcdn.net/fcs/ident2 HTTP/1.1 Content-Type: application/x-fcs User-Agent: Shockwave Flash Host: fms035.lo1.hwcdn.net Content-Length: 1 Proxy-Connection: Keep-Alive Pragma: no-cache HTTP/1.1 200 OK Cache-Control: no-cache Connection: Keep-Alive Content-Length: 14 Server: FlashCom/3.5.5 Content-Type: text/plain 209.197.11.150POST http://209.197.11.219/open/1 HTTP/1.1 Content-Type: application/x-fcs User-Agent: Shockwave Flash Host: 209.197.11.219 Content-Length: 1 Proxy-Connection: Keep-Alive Pragma: no-cache HTTP/1.1 200 OK Cache-Control: no-cache Connection: Keep-Alive Content-Length: 17 Server: FlashCom/3.5.5 Content-Type: application/x-fcs Wubmcmj7Q1T-6Tic POST http://209.197.11.219/idle/Wubmcmj7Q1T-6Tic/0 HTTP/1.1 Content-Type: application/x-fcs User-Agent: Shockwave Flash Host: 209.197.11.219 Content-Length: 1 Proxy-Connection: Keep-Alive Pragma: no-cache HTTP/1.1 200 OK Cache-Control: no-cache Connection: Keep-Alive Content-Length: 1 Server: FlashCom/3.5.5 Content-Type: application/x-fcs POST http://209.197.11.219/send/Wubmcmj7Q1T-6Tic/1 HTTP/1.1 Content-Type: application/x-fcs User-Agent: Shockwave Flash Host: 209.197.11.219 Content-Length: 1537 Proxy-Connection: Keep-Alive Pragma: no-cache HTTP/1.1 200 OK Cache-Control: no-cache Connection: Keep-Alive Content-Length: 3074 Server: FlashCom/3.5.5 Content-Type: application/x-fcs
这些是由shockwave flash player制作的HTTP POST请求 (plugin-containter.exe)按顺序
http://fms006.lo1.hwcdn.net/fcs/ident2 http://209.197.11.150/open/1 http://209.197.11.150/idle/2BZmcmj6mhTWexFa/0 http://209.197.11.150/send/2BZmcmj6mhTWexFa/1 http://209.197.11.150/send/2BZmcmj6mhTWexFa/2 http://209.197.11.150/idle/2BZmcmj6mhTWexFa/3 http://209.197.11.150/send/2BZmcmj6mhTWexFa/4 http://209.197.11.150/send/2BZmcmj6mhTWexFa/5 http://209.197.11.150/idle/2BZmcmj6mhTWexFa/6 _this continues till /407..._
我不明白。我对这种沟通的确切方式感到困惑 发生了什么?我无法找到视频源。据我所知,来自 SMIL请求(浏览器使它)获取服务器地址然后 shockwaveplayer正在接管这些HTTP的通信和响应 POST请求是块中的视频。
但是&amp;它在哪里确定它想要的视频? RTMP在哪里?什么是 网址?我该如何下载?
答案 0 :(得分:2)
我不知道这是一个与编程相关的问题,但这里有:
如何/在哪里?
在SMIL文件中,您可以看到base和 视频源。所以完整的URL(可能受到保护):
RTMP://fms006.lo1.hwcdn.net/m7n9i8d5/_definst_fms/videos/5_Standard_Zipper/B_Overview_of_Zipper_Types doppl = 965d6485db1d06d2&安培; dopsig = 867922856d781b57521a1dd3f7c28c5b
RTMP在哪里?
不确定你在问什么。该 SMIL明确引用RTMP 流URL。
如何下载?
最好的办法可能是尝试使用能够通过各种机制捕获HTTP / RTMP流的任意数量的3rd party tools。
不是你要问的(并不是说这确实是一个与节目相关的问题),但许多网站在未经许可下载内容时会皱眉头。
答案 1 :(得分:-1)
rtmpdump -r rtmp://fms.484C.edgecastcdn.net/00484C/videos/5_Standard_Zipper \ -a 00484C/videos/5_Standard_Zipper -y B_Overview_of_Zipper_Types \ -W http://esewingworkshop.com/sites/default/libraries/mediaplayer-5/player_5.6.swf \ -o a.flv RTMPDump v2.4-84-gdd57cd0 (c) 2010 Andrej Stepanchuk, Howard Chu, The Flvstreamer Team; license: GPL Connecting ... INFO: Connected... Starting download at: 0.000 kB [...] 10780.451 kB / 241.50 sec (99.9%) Download complete