554,8554 - Pentesting RTSP
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
From wikipedia:
The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points. Clients of media servers issue VHS-style commands, such as play, record and pause, to facilitate real-time control of the media streaming from the server to a client (Video On Demand) or from a client to the server (Voice Recording).
The transmission of streaming data itself is not a task of RTSP. Most RTSP servers use the Real-time Transport Protocol (RTP) in conjunction with Real-time Control Protocol (RTCP) for media stream delivery. However, some vendors implement proprietary transport protocols. The RTSP server software from RealNetworks, for example, also used RealNetworks' proprietary Real Data Transport (RDT).
Default ports: 554,8554
RTSP is similar to HTTP but designed specifically for media streaming. It's defined in a straightforward specification which can be found here:
Devices might allow unauthenticated or authenticated access. To check, a "DESCRIBE" request is sent. A basic example is shown below:
DESCRIBE rtsp://<ip>:<port> RTSP/1.0\r\nCSeq: 2
Remember, the correct formatting includes a double "\r\n" for a consistent response. A "200 OK" response indicates unauthenticated access, while "401 Unauthorized" signals the need for authentication, revealing if Basic or Digest authentication is required.
For Basic authentication, you encode the username and password in base64 and include it in the request like so:
DESCRIBE rtsp://<ip>:<port> RTSP/1.0\r\nCSeq: 2\r\nAuthorization: Basic YWRtaW46MTIzNA==
This example uses "admin" and "1234" for the credentials. Here's a Python script to send such a request:
Basic authentication is simpler and preferred. Digest authentication requires careful handling of the authentication details provided in the "401 Unauthorized" response.
This overview simplifies the process of accessing RTSP streams, focusing on Basic authentication for its simplicity and practicality in initial attempts.
Lets get information about valid methods and URLs are supported and try to brute-force the access (if needed) to get access to the content.
To bruteforce: https://github.com/Tek-Security-Group/rtsp_authgrinder
Detect open RTSP hosts on any accessible target
Get their public info (hostname, port, camera model, etc.)
Launch automated dictionary attacks to get their stream route (for example /live.sdp)
Launch automated dictionary attacks to get the username and password of the cameras
Generate thumbnails from them to check if the streams are valid and to have a quick preview of their content
Try to create a Gstreamer pipeline to check if they are properly encoded
Print a summary of all the informations Cameradar could get
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)