# 554,8554 - Pentesting RTSP
Support HackTricks and get benefits! - Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)! - Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family) - Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) - **Join the** [**šŸ’¬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**šŸ¦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.** - **Share your hacking tricks by submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**
## Basic Information > The **Real Time Streaming Protocol** (**RTSP**) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points. Clients of media servers issue VHS-style commands, such as play, record and pause, to facilitate real-time control of the media streaming from the server to a client (Video On Demand) or from a client to the server (Voice Recording). > > The transmission of streaming data itself is not a task of RTSP. Most RTSP servers use the Real-time Transport Protocol (RTP) in conjunction with Real-time Control Protocol (RTCP) for media stream delivery. However, some vendors implement proprietary transport protocols. The RTSP server software from RealNetworks, for example, also used RealNetworks' proprietary Real Data Transport (RDT). From [wikipedia](https://en.wikipedia.org/wiki/Real\_Time\_Streaming\_Protocol). **Default ports:** 554,8554 ``` PORT STATE SERVICE 554/tcp open rtsp ``` ## Detailed Information First and foremost RTSP is an HTTP like protocol. It has different structure and control commands but is textual in its format and once you learn the basics of the commands and how they interact, fairly easy to use. The specification for RTSP is pretty straightforward. Here is a link to it: [RTSP ā€“ RFC2326](https://tools.ietf.org/html/rfc2326) RTSP can be accessed unauthenticated (common in off-the-shelf devices) or authenticated. Authenticated access mirrors HTTP in that you have Basic and Digest authentication, both nearly identical to HTTP. To find out whether your device is authenticated or unauthenticated, simply send a ā€œDESCRIBEā€ request. A simple DESCRIBE request looks like: `DESCRIBE rtsp://: RTSP/1.0\r\nCSeq: 2` Note: the additional ā€œ\r\nā€ is required for reliable response. Some systems will accept the single ā€œ\r\nā€ but most wonā€™t. This can be sent down a raw socket. Just like HTTP, a successful response indicating unauthenticated access is available will contain a ā€œ200 OKā€. In this case with DESCRIBE, it will also contain all of the operational parameters of the video feed. If the device requires authentication, the the response back will contain ā€œ401 Unauthorizedā€. The response will also indicate what authentication mechanisms are available. If Basic authentication is available the response string will contain an information line that has ā€œWWW-Authenticate: Basicā€. The rest of the information provide with Basic authentication is largely irrelevant to actually conduct basic authentication. If Digest authentication is required, then the ā€œ401 Unauthorizedā€ response will have an information line containing ā€œWWW-Authenticate: Digestā€. The information with the Digest specification IS very important if you are going to do Digest authentication, so donā€™t ignore it. Basic authentication is the way to go, hopefully the response received indicates that it is available. If not there are three different methods to assemble a Digest authentication element, so Digest can become troublesome, especially blind (unauthenticated). The rest of this article will stick with Basic authentication. I may write a follow-up article later once I decipher the secret sauce to doing Digest authentication blind. To formulate a Basic authentication element, one simple has to base 64 encode \ ā€œ:ā€ \ and add it to the request. So a new request would look like: `DESCRIBE rtsp://: RTSP/1.0\r\nCSeq: 2\r\nAuthorization: Basic YWRtaW46MTIzNA==` Again note the request is terminated with the double ā€œ\r\nā€. The value YWRtaW46MTIzNA== is the base 64 encoded username and password concatenated with ā€œ:ā€. In this case I have used ā€œadminā€/ā€1234ā€. Some simple python scripting to try this out looks like: ```python import socket req = "DESCRIBE rtsp://: RTSP/1.0\r\nCSeq: 2\r\nAuthorization: Basic YWRtaW46MTIzNA==\r\n\r\n" s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("192.168.1.1", 554)) s.sendall(req) data = s.recv(1024) print(data) ``` Voila! You have access. **From:** [**http://badguyfu.net/rtsp-brute-forcing-for-fun-and-naked-pictures/**](https://web.archive.org/web/20161020202643/http://badguyfu.net/rtsp-brute-forcing-for-fun-and-naked-pictures/) ## Enumeration Lets get information about valid methods and URLs are supported and try to brute-force the access (if needed) to get access to the content. ```bash nmap -sV --script "rtsp-*" -p ``` ### [Brute Force](../generic-methodologies-and-resources/brute-force.md#rtsp) ### **Other useful programs** To bruteforce: [https://github.com/Tek-Security-Group/rtsp\_authgrinder](https://github.com/Tek-Security-Group/rtsp\_authgrinder) **Cameradar** Cameradar allows you to: * Detect open RTSP hosts on any accessible target * Get their public info (hostname, port, camera model, etc.) * Launch automated dictionary attacks to get their stream route (for example /live.sdp) * Launch automated dictionary attacks to get the username and password of the cameras * Generate thumbnails from them to check if the streams are valid and to have a quick preview of their content * Try to create a Gstreamer pipeline to check if they are properly encoded * Print a summary of all the informations Cameradar could get * [https://github.com/Ullaakut/cameradar](https://github.com/Ullaakut/cameradar)
Support HackTricks and get benefits! - Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)! - Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family) - Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) - **Join the** [**šŸ’¬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**šŸ¦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.** - **Share your hacking tricks by submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**