Skip to content

Instantly share code, notes, and snippets.

Jan Löbel JanLoebel

Block or report user

Report or block JanLoebel

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
JanLoebel /
Last active Jan 22, 2020
Hikam S6 Reverse Engineering (HI3518 E)

Reverse Engineering of Hikam S6 (HI3518 E)


I wanted to integrate the camera into my home security system. The only problem is that I want to toggle the alarm of the camera based on the security system status. Currently, this is only available via the app or a time trigger which is booth not sufficient for me. So the main target was to change the alarm status without the app.

What I've done so far:

My first try was to capture the TCP packages between the Android app and the camera. Soon I realized that they are only TCP+SSL (not pinned) requests to a cloud service of Hikam. So I installed an emulator with the Hikam app and Wireshark. I've seen some packages but the payload is very strange and even if I send the UDP commands again the status won't change. So this was a dead end for me.

JanLoebel / cloudSettings
Last active May 2, 2017
Visual Studio Code Sync Settings Gist
View cloudSettings
You can’t perform that action at this time.