Forked from fritz-smh/yi-hack.
This project is a collection of scripts and binaries file to hack your Xiaomi Yi Ants camera.
This camera has the default following features :
- wifi
- night vision
- motion detection : a video file is generated if a motion have been detected in the last 60 seconds.
- send video data over the network on Chinese servers in the cloud to allow people to view camera data from their smartphone wherever they are.
- setup thanks to a smartphone application.
- local video storage on a SD card
- no RTSP server in the last firmwares
This hack includes :
- DHCP or manual network configuration
- ntpclient (set date and time over internet)
- Base firmware is : M release.
- Enable/Disable Cloud (Yi Home App).
- no more need to use a smartphone application
- RTSP server activated
- Telnet server activated
- HTTP server activated
- FTP server activated
- No more (chinese) voices on startup
If you have some issues to use your camera, even without this firmware, please read this webpage : https://diy.2pmc.net/solved-xiaomi-xiao-yi-ant-home-camera-can-used-china/ (more information about users issues here : fritz-smh#8 )
The memory card must stay in the camera ! If you remove it, the camera will start without using the hack.
Clone this repository on a computer :
git clone http://github.com/death2all110/yi-hack.git
Then, format a micro SD card in fat32 (vfat) format and copy the content of the yi-hack/sd/ folder at the root of your memory card.
The memory card will so contain :
- home : the official firmware file compliant with this hack
- test : the folder which contains the hack scripts and binaries
- record : this folder will only be created when some video records will be added on the memory card by the camera
- record_sub : this folder will only be created when some video records will be added on the memory card by the camera
You will either need to set a static IP address for the camera or use DHCP (set DHCP to 'yes' in test/yi-hack.cfg. You still need to enter your wi-fi network information inside test/wpa_supplicant.conf).
To check for the available IPs on your network, you can use the Fing application to scan the network on your Android smartphone.
To configure the wifi network to use, copy test/config/wpa_supplicant.conf.example to test/config/wpa_supplicant.conf and edit it.
To configure your IP address, copy test/config/yi-hack.cfg.example to test/config/yi-hack.cfg and set the values, or set DHCP to 'yes'.
- If plugged, unplug the Yi camera
- Insert the memory card in the Yi camera
- Plug the Yi camera
The camera will start. The led will indicate the current status :
- yellow : camera startup
- blue blinking : network configuration in progress (connec to wifi, set up the IP address)
- blue : network configuration is OK. Camera is ready to use.
You can test is your camera is up and running this hack with your browser on url http://ip/. You should see this page :
One change is needed on the camera filesystem which will not be reverted by removing the memory card : the file /home/timeout.g726 is renamed to /home/timeout.g726.OFF.
This is done because a process (rmm) tries to connect to the cloud process without success (as it is not started) and raise the play of a chinese voice timeout file. If this file would not be renamed, you would be bothered with this message.
Just do : strings home | grep version. Example :
$ strings home | grep version
version=1.8.5.1M_201512011815
You can easily use the Yi camera with the Domogik (http://www.domogik.org) home automation solution. You just need to install the domogik-plugin-yi package.
RTSP server is on port 554.
You can access the video over RTSP on 3 urls :
- High definition video and audio (h264) : http://ip:554/ch0_0.h264
- Low definition video and audio (h264) : http://ip:554/ch0_1.h264
- Audio (h264) : http://ip:554/ch0_3.h264
There is no login and password and currently no way to set it.
Each time a motion is detected, the camera will generate a video file (60s max). This file is stored on the memory card and can be accessed over :
- http server
- ftp server
The simplest way is to browse the file from the http server.
To know if a motion have been detected in the last minute, you can check the url http://ip/motion (GET). It can give :
- when no motion is detected : an empty content
- when motion is detected : a file path to the video file from the root of the http server
The telnet server is on port 23.
Default login/password :
- login = root
- password = 1234qwer (unless you specified another password in yi-hack.cfg file)
The ftp server is on port 21.
There is no login/password required.
Some scripts are provided in the sd/test/scripts folder. Please read the README.md file in this folder for more informations.
First, remove the SD card. But keep in mind that the timeout sound has been altered.
If you want the timeout sound back: Edit equip_test.sh to look like this:
#!/bin/sh
######################################################
# Xiaomi Yi hack restore
######################################################
### Rename back the timeout sound file ...
[ -f /home/timeout.g726.OFF ] && mv /home/timeout.g726.OFF /home/timeout.g726
sync
Then reboot the camera so the script runs. After remove the stuff from sd card and you are all original.
home Official firmware
test/ Yi hack folder
yi-hack.cfg Yi hack configuration file
equip_test.sh This script is called on camera startup and will launch all the needed processes
check_motion.sh This script will check each minute if a motion video has been recorded and fill the **motion** file of the http server
rtspsrvK|L|M The various RTSP server binary releases (the final letter is corresponding to the firmware)
http/ HTTP server folder
index.html HTTP server home page
record/ Mount point to access video records
server HTTP server binary
wpa_supplicant.conf Configuration file for wifi
log.txt Log file of the hack (filled by equip_test.sh)
TODO
Script that runs from equip_test.sh and tell us if a new video was created in the last minute (a video file is created in case of motion detection).
If a file is found, it adds the name of the file to the section GET /motion on the http server.
One might experience ^M return line while transfer file from dos to unix
use this command to return ^M every end of line
From Telnet:
#dos2unix /home/hd1/test/scripts/ftp_upload/common_lib.sh
#dos2unix /home/hd1/test/scripts/ftp_upload/ftp_upload.sh
#dos2unix /home/hd1/test/scripts/housekeeper/housekeeper.sh
See #34
Thanks @hyptechdev2015 for the fix!