2025年4月15日 星期二 乙巳(蛇)年 正月十六 设为首页 加入收藏
rss
您当前的位置:首页 > 计算机 > 编程开发 > Python

python3实现的rtsp客户端脚本

时间:06-06来源:作者:点击数:50

一、说明

此客户端使用python3编写

此客户端实现RTSP的OPTIONS, DESCRIBE, SETUP , PLAY, GET_PARAMETER,TEARDOWN方法,未实现ANNOUNCE,PAUSE,SET_PARAMETER,REDIRECT,RECORD

RTSP就是针对一个URL,或是依次或是有选择地执行以上11种请求;要做渗透测试,没很多可测的,也就测试URL中的参数和各请求方法的请求头参数有没有溢出

此客户端自动依次执行请求:OPTIONS--DESCRIBE(2次)--SETUP(2次)--PLAY--GET_PARAMETER(5次)--TEARDOWN

RTSP有Basic和Digest两种验证方法,此客户端实现默认使用Digest方法,如果想换用Basic方法请将config_dict['auth_method']的值由‘Digest’修改为‘Basic’

总体执行效果如下图所示

二、客户端源代码

V1.0版本(0525):

  • import base64
  • import socket
  • import hashlib
  • import time
  • global config_dict
  • config_dict = {
  • 'server_username': 'admin',
  • 'server_password': '1234567',
  • 'server_ip': '10.10.6.94',
  • 'server_port': 554,
  • 'server_path': '/chIP=1&streamType=main/',
  • 'cseq': 2,
  • 'user_agent': 'LibVLC/3.0.2 (LIVE555 Streaming Media v2016.11.28)',
  • 'buffer_len': 1024,
  • 'auth_method': 'Digest',
  • 'header_modify_allow': False,
  • 'options_header_modify': False,
  • 'describe_header_modify': False,
  • 'describe_auth_header_modify': False,
  • 'setup_header_modify': False,
  • 'setup_session_header_modify': False,
  • 'play_header_modify': False,
  • 'get_parameter_header_modify': False,
  • 'teardown_header_modify': False
  • }
  • def gen_response_value(url,public_method,realm,nonce):
  • frist_pre_md5_value = hashlib.md5((config_dict['server_username'] + ':' + realm + ':' + config_dict['server_password']).encode()).hexdigest()
  • first_post_md5_value = hashlib.md5((public_method+':' + url).encode()).hexdigest()
  • response_value = hashlib.md5((frist_pre_md5_value + ':' + nonce + ':' + first_post_md5_value).encode()).hexdigest()
  • return response_value
  • def gen_options_header():
  • global config_dict
  • str_options_header = 'OPTIONS rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_options_header += 'CSeq: ' + str(config_dict['cseq']) + '\r\n'
  • str_options_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_options_header += '\r\n'
  • return str_options_header
  • def gen_describe_header():
  • global config_dict
  • str_describe_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_describe_header += 'CSeq: ' + str(config_dict['cseq'] + 1) + '\r\n'
  • str_describe_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_describe_header += 'Accept: application/sdp\r\n'
  • str_describe_header += '\r\n'
  • return str_describe_header
  • def gen_describe_auth_header(url,realm,nonce):
  • global config_dict
  • public_method = 'DESCRIBE'
  • str_describe_auth_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0\r\n'
  • str_describe_auth_header += 'CSeq: ' + str(config_dict['cseq'] + 2) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_describe_auth_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = gen_response_value(url, public_method, realm, nonce)
  • str_describe_auth_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_describe_auth_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_describe_auth_header += 'Accept: application/sdp\r\n'
  • str_describe_auth_header += '\r\n'
  • return str_describe_auth_header
  • def gen_setup_header(url, realm, nonce):
  • global config_dict
  • public_method = 'SETUP'
  • str_setup_header = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + 'trackID=0 RTSP/1.0\r\n'
  • str_setup_header += 'CSeq: ' + str(config_dict['cseq'] + 3) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_setup_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = gen_response_value(url, public_method, realm, nonce)
  • str_setup_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_setup_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_setup_header += 'Transport: RTP/AVP;unicast;client_port=50166-50167\r\n'
  • str_setup_header += '\r\n'
  • return str_setup_header
  • def gen_setup_session_header(url, realm, nonce,session):
  • global config_dict
  • public_method = 'SETUP'
  • str_setup_session_header = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + '/trackID=1 RTSP/1.0\r\n'
  • str_setup_session_header += 'CSeq: ' + str(config_dict['cseq'] + 4) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_setup_session_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = gen_response_value(url, public_method, realm, nonce)
  • str_setup_session_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_setup_session_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_setup_session_header += 'Transport: RTP/AVP;unicast;client_port=50168-50169\r\n'
  • str_setup_session_header += 'Session: '+session+'\r\n'
  • str_setup_session_header += '\r\n'
  • return str_setup_session_header
  • def gen_play_header(url, realm, nonce,session):
  • global config_dict
  • public_method = 'PLAY'
  • str_play_header = 'PLAY rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_play_header += 'CSeq: ' + str(config_dict['cseq'] + 5) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_play_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = gen_response_value(url, public_method, realm, nonce)
  • str_play_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_play_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_play_header += 'Session: '+session+'\r\n'
  • str_play_header += 'Range: npt=0.000-\r\n'
  • str_play_header += '\r\n'
  • return str_play_header
  • def gen_get_parameter_header(url, realm, nonce, session,count):
  • global config_dict
  • public_method = 'GET_PARAMETER'
  • str_get_parameter_header = 'GET_PARAMETER rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_get_parameter_header += 'CSeq: ' + str(config_dict['cseq'] + 6+int(count)) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_get_parameter_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = gen_response_value(url, public_method, realm, nonce)
  • str_get_parameter_header += 'Authorization: Digest username="' + config_dict[
  • 'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"\r\n'
  • str_get_parameter_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_get_parameter_header += 'Session: ' + session + '\r\n'
  • str_get_parameter_header += '\r\n'
  • return str_get_parameter_header
  • def gen_teardown_header(url, realm, nonce, session):
  • global config_dict
  • public_method = 'TEARDOWN'
  • str_teardown_header = 'TEARDOWN rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0\r\n'
  • str_teardown_header += 'CSeq: ' + str(config_dict['cseq'] + 11) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_teardown_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = gen_response_value(url, public_method, realm, nonce)
  • str_teardown_header += 'Authorization: Digest username="' + config_dict[
  • 'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"\r\n'
  • str_teardown_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_teardown_header += 'Session: ' + session + '\r\n'
  • str_teardown_header += '\r\n'
  • return str_teardown_header
  • def add_header_according_to_protocol(str_header):
  • str_header = str_header[0:len(str_header)-2]
  • str_header += 'Accept: application/rtsl, application/sdp;level=2'
  • str_header += 'Accept-Encoding: \r\n'
  • str_header += 'Accept-Language: \r\n'
  • str_header += 'Authorization: \r\n'
  • str_header += 'Bandwidth: 1*DIGIT \r\n'
  • str_header += 'Blocksize: \r\n'
  • str_header += 'Cache-Control: no-cache \r\n'
  • str_header += 'Conference: 199702170042.SAA08642@obiwan.arl.wustl.edu%20Starr \r\n'
  • str_header += 'Connection: \r\n'
  • str_header += 'Content-Base: \r\n'
  • str_header += 'Content-Encoding: \r\n'
  • str_header += 'Content-Language: \r\n'
  • str_header += 'Content-Length: 20 \r\n'
  • str_header += 'Content-Location: \r\n'
  • str_header += 'Content-Type: \r\n'
  • str_header += 'Date: \r\n'
  • str_header += 'Expires: Thu, 01 Dec 1994 16:00:00 GMT \r\n'
  • str_header += 'From: \r\n'
  • str_header += 'If-Modified-Since: Sat, 29 Oct 1994 19:43:31 GMT \r\n'
  • str_header += 'Last-Modified: \r\n'
  • str_header += 'Proxy-Require: \r\n'
  • str_header += 'Referer: \r\n'
  • str_header += 'Require: funky-feature \r\n'
  • str_header += 'Scale: -3.5 \r\n'
  • str_header += 'Speed: 2.5 \r\n'
  • str_header += 'Transport: RTP/AVP;unicast;client_port=3456-3457;mode="PLAY" \r\n'
  • str_header += 'User-Agent: \r\n'
  • str_header += 'Via: \r\n'
  • str_header += 'Range: npt=2\r\n'
  • str_header += '\r\n'
  • return str_header
  • def exec_full_request():
  • socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  • socket_send.settimeout(5)
  • socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
  • url = 'rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path']
  • print('now start to check options operation')
  • str_options_header = gen_options_header()
  • if config_dict['header_modify_allow'] & config_dict['options_header_modify']:
  • str_options_header = add_header_according_to_protocol(str_options_header)
  • socket_send.send(str_options_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • if '200 OK' in msg_recv:
  • print('OPTIONS request is OK')
  • else:
  • print('OPTIONS request is BAD')
  • str_describe_header = gen_describe_header()
  • if config_dict['header_modify_allow'] & config_dict['describe_header_modify']:
  • str_describe_header = add_header_according_to_protocol(str_describe_header)
  • socket_send.send(str_describe_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('401 Unauthorized') == -1 & False:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('first DESCRIBE request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('first DESCRIBE is ok,now we will execute second DESCRIBE for auth')
  • realm_pos = msg_recv.find('realm')
  • realm_value_begin_pos = msg_recv.find('"', realm_pos)+1
  • realm_value_end_pos = msg_recv.find('"', realm_pos + 8)
  • realm_value = msg_recv[realm_value_begin_pos:realm_value_end_pos]
  • nonce_pos = msg_recv.find('nonce')
  • nonce_value_begin_pos = msg_recv.find('"', nonce_pos)+1
  • nonce_value_end_pos = msg_recv.find('"', nonce_pos + 8)
  • nonce_value = msg_recv[nonce_value_begin_pos:nonce_value_end_pos]
  • str_describe_auth_header = gen_describe_auth_header(url, realm_value, nonce_value)
  • if config_dict['header_modify_allow'] & config_dict['describe_auth_header_modify']:
  • str_describe_auth_header = add_header_according_to_protocol(str_describe_auth_header)
  • socket_send.send(str_describe_auth_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('second DESCRIBE request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('second DESCRIBE is ok,now we will execute first SETUP for session')
  • str_setup_header = gen_setup_header(url, realm_value, nonce_value)
  • if config_dict['header_modify_allow'] & config_dict['setup_header_modify']:
  • str_setup_header = add_header_according_to_protocol(str_setup_header)
  • socket_send.send(str_setup_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('first SETUP request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('first SETUP is ok,now we will execute second SETUP')
  • session_pos = msg_recv.find('Session')
  • session_value_begin_pos = msg_recv.find(' ',session_pos+8)+1
  • session_value_end_pos = msg_recv.find(';',session_pos+8)
  • session_value = msg_recv[session_value_begin_pos:session_value_end_pos]
  • str_setup_session_header = gen_setup_session_header(url, realm_value, nonce_value,session_value)
  • if config_dict['header_modify_allow'] & config_dict['setup_session_header_modify']:
  • str_setup_session_header = add_header_according_to_protocol(str_setup_session_header)
  • socket_send.send(str_setup_session_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('first SETUP request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('second SETUP is ok, now we wil execute PLAY')
  • str_play_header = gen_play_header(url, realm_value, nonce_value, session_value)
  • if config_dict['header_modify_allow'] & config_dict['play_header_modify']:
  • str_play_header = add_header_according_to_protocol(str_play_header)
  • socket_send.send(str_play_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('PLAY request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('PLAY is ok, we will execute GET_PARAMETER every 10 seconds and 5 times total')
  • for i in range(2):
  • str_get_parameter_header = gen_get_parameter_header(url, realm_value, nonce_value, session_value,str(i))
  • if config_dict['header_modify_allow'] & config_dict['get_parameter_header_modify']:
  • str_get_parameter_header = add_header_according_to_protocol(str_get_parameter_header)
  • socket_send.send(str_get_parameter_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print(str(i)+'*10:'+msg_recv_dict[0])
  • time.sleep(10)
  • print('now we will execute TEARDOWN to disconnect with server')
  • str_teardown_header = gen_teardown_header(url, realm_value, nonce_value, session_value)
  • if config_dict['header_modify_allow'] & config_dict['teardown_header_modify']:
  • str_teardown_header = add_header_according_to_protocol(str_teardown_header)
  • socket_send.send(str_teardown_header.encode())
  • msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
  • print(msg_recv)
  • print('program execute finished, thank you')
  • socket_send.close()
  • exec_full_request()

V1.1版本(0614):

  • import socket
  • import hashlib
  • import base64
  • import time
  • config_dict = {
  • 'server_username': 'admin', #RTSP用户名
  • 'server_password': '123456', #RTSP用户名对应密码
  • 'server_ip': '10.10.6.92', #RTSP服务器IP地址
  • 'server_port': 554, #RTSP服务器使用端口
  • 'server_path': '/chIP=1&streamType=main/', #URL中端口之后的部份,测试发现不同服务器对这部份接受的值是不一样的,也就是说自己使用时很可能得自己修改这部份的值
  • 'cseq': 2, #RTSP使用的请求起始序列码,不需要改动
  • 'user_agent': 'LibVLC/3.0.2 (LIVE555 Streaming Media v2016.11.28)', #自定义请求头部
  • 'buffer_len': 1024, #用于接收服务器返回数据的缓冲区的大小
  • 'auth_method': 'Digest', #RTSP使用的认证方法,Basic/Digest
  • 'header_normal_modify_allow': False, #是否允许拼接其他协议规定的请求头的总开关,请些请求头的值为正常值(大多是RFC给出的示例)
  • 'header_overload_modify_allow': False, #是否允许拼接其他协议规定的请求头的总开关,请些请求头的值为超长字符串
  • 'options_header_modify': True, #OPTIONS请求中,是否允许拼接其他协议规定的请求头的开关
  • 'describe_header_modify': True, #第一次DESCRIBE请求中,是否允许拼接其他协议规定的请求头的开关
  • 'describe_auth_header_modify': True, #第二次DESCRIBE请求中,是否允许拼接其他协议规定的请求头的开关
  • 'setup_header_modify': True, #第一次SETUP请求中,是否允许拼接其他协议规定的请求头的开关
  • 'setup_session_header_modify': True, #第二次SETUP请求中,是否允许拼接其他协议规定的请求头的开关
  • 'play_header_modify': True, #PLAY请求中,是否允许拼接其他协议规定的请求头的开关
  • 'get_parameter_header_modify': True, #GET PARAMETER请求中,是否允许拼接其他协议规定的请求头的开关
  • 'teardown_header_modify': True #TEARDOWN请求中,是否允许拼接其他协议规定的请求头的开关
  • }
  • class RtspClient():
  • def __init__(self):
  • # self.socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  • # self.socket_send.settimeout(5)
  • # self.socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
  • pass
  • #用于Digest认证方式时生成response的值
  • def gen_response_value(self,url,public_method,realm,nonce):
  • frist_pre_md5_value = hashlib.md5((config_dict['server_username'] + ':' + realm + ':' + config_dict['server_password']).encode()).hexdigest()
  • first_post_md5_value = hashlib.md5((public_method+':' + url).encode()).hexdigest()
  • response_value = hashlib.md5((frist_pre_md5_value + ':' + nonce + ':' + first_post_md5_value).encode()).hexdigest()
  • return response_value
  • #生成options请求头部
  • def gen_options_header(self):
  • global config_dict
  • str_options_header = 'OPTIONS rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_options_header += 'CSeq: ' + str(config_dict['cseq']) + '\r\n'
  • str_options_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_options_header += '\r\n'
  • return str_options_header
  • #生成第一次describe请求头部
  • def gen_describe_header(self):
  • global config_dict
  • str_describe_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_describe_header += 'CSeq: ' + str(config_dict['cseq'] + 1) + '\r\n'
  • str_describe_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_describe_header += 'Accept: application/sdp\r\n'
  • str_describe_header += '\r\n'
  • return str_describe_header
  • #生成第二次describe请求头部
  • def gen_describe_auth_header(self,url,realm,nonce):
  • global config_dict
  • public_method = 'DESCRIBE'
  • str_describe_auth_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0\r\n'
  • str_describe_auth_header += 'CSeq: ' + str(config_dict['cseq'] + 2) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_describe_auth_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = self.gen_response_value(url, public_method, realm, nonce)
  • str_describe_auth_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_describe_auth_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_describe_auth_header += 'Accept: application/sdp\r\n'
  • str_describe_auth_header += '\r\n'
  • return str_describe_auth_header
  • #生成第一次setup请求头部
  • def gen_setup_header(self,url, realm, nonce):
  • global config_dict
  • public_method = 'SETUP'
  • str_setup_header = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + 'trackID=0 RTSP/1.0\r\n'
  • str_setup_header += 'CSeq: ' + str(config_dict['cseq'] + 3) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_setup_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = self.gen_response_value(url, public_method, realm, nonce)
  • str_setup_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_setup_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_setup_header += 'Transport: RTP/AVP;unicast;client_port=50166-50167\r\n'
  • str_setup_header += '\r\n'
  • return str_setup_header
  • #生成第二次setup请求头部
  • def gen_setup_session_header(self,url, realm, nonce,session):
  • global config_dict
  • public_method = 'SETUP'
  • str_setup_session_header = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + 'trackID=1 RTSP/1.0\r\n'
  • str_setup_session_header += 'CSeq: ' + str(config_dict['cseq'] + 4) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_setup_session_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = self.gen_response_value(url, public_method, realm, nonce)
  • str_setup_session_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_setup_session_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_setup_session_header += 'Transport: RTP/AVP;unicast;client_port=50168-50169\r\n'
  • str_setup_session_header += 'Session: '+session+'\r\n'
  • str_setup_session_header += '\r\n'
  • return str_setup_session_header
  • #生成play请求头部
  • def gen_play_header(self,url, realm, nonce,session):
  • global config_dict
  • public_method = 'PLAY'
  • str_play_header = 'PLAY rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_play_header += 'CSeq: ' + str(config_dict['cseq'] + 5) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_play_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = self.gen_response_value(url, public_method, realm, nonce)
  • str_play_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"\r\n'
  • str_play_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_play_header += 'Session: '+session+'\r\n'
  • str_play_header += 'Range: npt=0.000-\r\n'
  • str_play_header += '\r\n'
  • return str_play_header
  • #生成GET_PARAMETER请求头部
  • def gen_get_parameter_header(self,url, realm, nonce, session,count):
  • global config_dict
  • public_method = 'GET_PARAMETER'
  • str_get_parameter_header = 'GET_PARAMETER rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
  • 'server_path'] + ' RTSP/1.0\r\n'
  • str_get_parameter_header += 'CSeq: ' + str(config_dict['cseq'] + 6+int(count)) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_get_parameter_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = self.gen_response_value(url, public_method, realm, nonce)
  • str_get_parameter_header += 'Authorization: Digest username="' + config_dict[
  • 'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"\r\n'
  • str_get_parameter_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_get_parameter_header += 'Session: ' + session + '\r\n'
  • str_get_parameter_header += '\r\n'
  • return str_get_parameter_header
  • #生成teardown请求头部
  • def gen_teardown_header(self,url, realm, nonce, session):
  • global config_dict
  • public_method = 'TEARDOWN'
  • str_teardown_header = 'TEARDOWN rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0\r\n'
  • str_teardown_header += 'CSeq: ' + str(config_dict['cseq'] + 11) + '\r\n'
  • if config_dict['auth_method'] == 'Basic':
  • auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
  • str_teardown_header += 'Authorization: Basic '+auth_64 + ' \r\n'
  • else:
  • response_value = self.gen_response_value(url, public_method, realm, nonce)
  • str_teardown_header += 'Authorization: Digest username="' + config_dict[
  • 'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"\r\n'
  • str_teardown_header += 'User-Agent: ' + config_dict['user_agent'] + '\r\n'
  • str_teardown_header += 'Session: ' + session + '\r\n'
  • str_teardown_header += '\r\n'
  • return str_teardown_header
  • #拼接rtsp协议的其他请求头,以测试程序对这些请求头部的处理是否有问题;这个方法与add_overload_header_according_to_protocol是互斥的
  • def add_normal_header_according_to_protocol(self,str_header):
  • str_header = str_header[0:len(str_header)-2]
  • str_header += 'Accept: application/rtsl, application/sdp;level=-2'
  • str_header += 'Accept-Encoding: gzip;q=1.0, identity; q=0.5, *;q=0\r\n'
  • str_header += 'Accept-Language: da, en-gb;q=0.8, en;q=0.7\r\n'
  • str_header += 'Bandwidth: 4000 \r\n'
  • str_header += 'Blocksize: 4000 \r\n'
  • str_header += 'Cache-Control: no-cache;max-stale \r\n'
  • str_header += 'Conference: 199702170042.SAA08642@obiwan.arl.wustl.edu%20Starr \r\n'
  • str_header += 'Connection: close\r\n'
  • str_header += 'Content-Base: gzip\r\n'
  • str_header += 'Content-Encoding: gzip\r\n'
  • str_header += 'Content-Language: mi,en\r\n'
  • str_header += 'Content-Length: 2034953454546565 \r\n'
  • str_header += 'Content-Location: /etc/passwd\r\n'
  • str_header += 'Content-Type: text/html; charset=ISO-8859-4gg\r\n'
  • str_header += 'Date: Tue, 15 Nov 1995x 08:12:31 GMT\r\n'
  • str_header += 'Expires: Thu, 01 Dec 1994 16:00:00 GMT \r\n'
  • str_header += 'From: webmaster@w3.org\r\n'
  • str_header += 'If-Modified-Since: Sat, 29 Oct 1994 19:43:31 GMT \r\n'
  • str_header += 'Last-Modified: Tue, 15 Nov 1994 12:45:26 GMT\r\n'
  • str_header += 'Proxy-Require: funky-feature\r\n'
  • str_header += 'Referer: http://www.w3.org/hypertext/DataSources/Overview.html\r\n'
  • str_header += 'Require: funky-feature \r\n'
  • str_header += 'Scale: -3.5 \r\n'
  • str_header += 'Speed: 2.5 \r\n'
  • str_header += 'Transport: RTP/AVP;unicast;client_port=3456-3457;mode="PLAY" \r\n'
  • str_header += 'Via: 1.0 fred, 1.1 nowhere.com (Apache/1.1)\r\n'
  • str_header += 'Range: npt=2\r\n'
  • str_header += '\r\n'
  • return str_header
  • #拼接rtsp协议的其他请求头,并将这些请求头的字赋为超长字符串,以测试程序对这些请求头部的处理是否有缓冲区溢出问题;这个方法与add_normal_header_according_to_protocol是互斥的
  • def add_overload_header_according_to_protocol(self,str_header):
  • str_header = str_header[0:len(str_header) - 2]
  • str_header += 'Accept: application/rtsl012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789, application/sdp;level=-2012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789'
  • str_header += 'Accept-Encoding: gzip01234567890123456789012345678901234567890123456789;q=1.0012345678901234567890123456789012345678901234567890123456789, identity; q=0.5012345678901234567890123456789, *;q=0012345678901234567890123456789\r\n'
  • str_header += 'Accept-Language: da, en-gb;q=0.80123456789012345678901234567890123456789, en;q=0.7012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789\r\n'
  • str_header += 'Bandwidth: 400001234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 \r\n'
  • str_header += 'Blocksize: 4000012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 \r\n'
  • str_header += 'Cache-Control: no-cache;max-stale \r\n'
  • str_header += 'Conference: 199702170042.SAA08642@obiwan.arl.wustl.edu%20Starr01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 \r\n'
  • str_header += 'Connection: 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789close\r\n'
  • str_header += 'Content-Base: 0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789gzip\r\n'
  • str_header += 'Content-Encoding: 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789gzip\r\n'
  • str_header += 'Content-Language: 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789mi,en\r\n'
  • str_header += 'Content-Length: 203495345454656501234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 \r\n'
  • str_header += 'Content-Location: /etc/passwd01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789\r\n'
  • str_header += 'Content-Type: text/html012345678901234567890123456789012345678901234567890123456789; charset=012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789ISO-8859-4gg\r\n'
  • str_header += 'Date: Tue, 15 Nov 1995x 08:12:310123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 GMT\r\n'
  • str_header += 'Expires: Thu, 01 Dec 1994 16012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789:00:00 GMT \r\n'
  • str_header += 'From: webmaster@w30123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789.org\r\n'
  • str_header += 'If-Modified-Since: Sat, 29 Oct 1994 19:43:31012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 GMT \r\n'
  • str_header += 'Last-Modified: Tue, 15 Nov 1994 120123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789:45:26 GMT\r\n'
  • str_header += 'Proxy-Require: funky-feature\r\n'
  • str_header += 'Referer: http://www.w3.org/hypertext/DataSources/Overview.html\r\n'
  • str_header += 'Require: funky-feature0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 \r\n'
  • str_header += 'Scale: -0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567893.5 \r\n'
  • str_header += 'Speed: 20123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789.5 \r\n'
  • str_header += 'Transport: RTP/AVP;unicast;client_port=3456-345012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567897;mode="01234567890123456789PLAY" \r\n'
  • str_header += 'Via: 1.0 fred, 0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567891.1 nowhere.com (Apache/0123456789012345678901234567891.1)\r\n'
  • str_header += 'Range: npt=20123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789\r\n'
  • str_header += '\r\n'
  • return str_header
  • #执行一次完整的rtsp播放请求,OPTIONS/DESCRIBE/SETUP/PLAY/GET PARAMETER/TEARDOWN,如果某个请求不正确则中止
  • #此方法推荐用于则试服务端是否正确实现RTSP服务
  • def exec_full_request(self):
  • self.socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  • self.socket_send.settimeout(5)
  • self.socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
  • url = 'rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path']
  • print('now start to check options operation')
  • str_options_header = self.gen_options_header()
  • if config_dict['header_normal_modify_allow'] & config_dict['options_header_modify']:
  • str_options_header = self.add_normal_header_according_to_protocol(str_options_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['options_header_modify']:
  • str_options_header = self.add_overload__header_according_to_protocol(str_options_header)
  • self.socket_send.send(str_options_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • if '200 OK' in msg_recv:
  • print('OPTIONS request is OK')
  • else:
  • print('OPTIONS request is BAD')
  • str_describe_header = self.gen_describe_header()
  • if config_dict['header_normal_modify_allow'] & config_dict['describe_header_modify']:
  • str_describe_header = self.add_normal_header_according_to_protocol(str_describe_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['describe_header_modify']:
  • str_describe_header = self.add_overload__header_according_to_protocol(str_describe_header)
  • self.socket_send.send(str_describe_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('401 Unauthorized') == -1 & False:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('first DESCRIBE request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('first DESCRIBE is ok,now we will execute second DESCRIBE for auth')
  • realm_pos = msg_recv.find('realm')
  • realm_value_begin_pos = msg_recv.find('"', realm_pos)+1
  • realm_value_end_pos = msg_recv.find('"', realm_pos + 8)
  • realm_value = msg_recv[realm_value_begin_pos:realm_value_end_pos]
  • nonce_pos = msg_recv.find('nonce')
  • nonce_value_begin_pos = msg_recv.find('"', nonce_pos)+1
  • nonce_value_end_pos = msg_recv.find('"', nonce_pos + 8)
  • nonce_value = msg_recv[nonce_value_begin_pos:nonce_value_end_pos]
  • str_describe_auth_header = self.gen_describe_auth_header(url, realm_value, nonce_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['describe_auth_header_modify']:
  • str_describe_auth_header = self.add_normal_header_according_to_protocol(str_describe_auth_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['describe_auth_header_modify']:
  • str_describe_auth_header = self.add_overload__header_according_to_protocol(str_describe_auth_header)
  • self.socket_send.send(str_describe_auth_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('second DESCRIBE request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('second DESCRIBE is ok,now we will execute first SETUP for session')
  • str_setup_header = self.gen_setup_header(url, realm_value, nonce_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['setup_header_modify']:
  • str_setup_header = self.add_normal_header_according_to_protocol(str_setup_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['setup_header_modify']:
  • str_setup_header = self.add_overload__header_according_to_protocol(str_setup_header)
  • self.socket_send.send(str_setup_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('first SETUP request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('first SETUP is ok,now we will execute second SETUP')
  • session_pos = msg_recv.find('Session')
  • session_value_begin_pos = msg_recv.find(' ',session_pos+8)+1
  • session_value_end_pos = msg_recv.find(';',session_pos+8)
  • session_value = msg_recv[session_value_begin_pos:session_value_end_pos]
  • str_setup_session_header = self.gen_setup_session_header(url, realm_value, nonce_value,session_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['setup_session_header_modify']:
  • str_setup_session_header = self.add_normal_header_according_to_protocol(str_setup_session_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['setup_session_header_modify']:
  • str_setup_session_header = self.add_overload_header_according_to_protocol(str_setup_session_header)
  • self.socket_send.send(str_setup_session_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('second SETUP request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('second SETUP is ok, now we wil execute PLAY')
  • str_play_header = self.gen_play_header(url, realm_value, nonce_value, session_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['play_header_modify']:
  • str_play_header = self.add_normal_header_according_to_protocol(str_play_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['play_header_modify']:
  • str_play_header = self.add_overload_header_according_to_protocol(str_play_header)
  • self.socket_send.send(str_play_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • if msg_recv.find('200 OK') == -1:
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('PLAY request occur error: ')
  • print(msg_recv_dict[0])
  • else:
  • print('PLAY is ok, we will execute GET_PARAMETER every 10 seconds and 5 times total')
  • for i in range(2):
  • str_get_parameter_header = self.gen_get_parameter_header(url, realm_value, nonce_value, session_value,str(i))
  • if config_dict['header_normal_modify_allow'] & config_dict['get_parameter_header_modify']:
  • str_get_parameter_header = self.add_normal_header_according_to_protocol(str_get_parameter_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['get_parameter_header_modify']:
  • str_get_parameter_header = self.add_overload_header_according_to_protocol(str_get_parameter_header)
  • self.socket_send.send(str_get_parameter_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print(str(i)+'*10:'+msg_recv_dict[0])
  • time.sleep(10)
  • print('\nnow we will execute TEARDOWN to disconnect with server')
  • str_teardown_header = self.gen_teardown_header(url, realm_value, nonce_value, session_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['teardown_header_modify']:
  • str_teardown_header = self.add_normal_header_according_to_protocol(str_teardown_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['teardown_header_modify']:
  • str_teardown_header = self.add_overload_header_according_to_protocol(str_teardown_header)
  • self.socket_send.send(str_teardown_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • print(msg_recv)
  • print('program execute finished, thank you')
  • self.socket_send.close()
  • #强制依次执行OPTIONS/DESCRIBE/SETUP/PLAY/GET PARAMETER/TEARDOWN,某个请求报错也进行下一个请求
  • #此方法推荐用于测试服务端是否有溢出漏洞
  • def exec_force_request(self):
  • self.socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  • self.socket_send.settimeout(5)
  • self.socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
  • url = 'rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path']
  • print('now start to check options operation')
  • str_options_header = self.gen_options_header()
  • if config_dict['header_normal_modify_allow'] & config_dict['options_header_modify']:
  • str_options_header = self.add_normal_header_according_to_protocol(str_options_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['options_header_modify']:
  • str_options_header = self.add_overload_header_according_to_protocol(str_options_header)
  • self.socket_send.send(str_options_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the OPTIONS response is :')
  • print(msg_recv_dict[0])
  • print('\nnow we will execute first DESCRIBE request')
  • str_describe_header = self.gen_describe_header()
  • if config_dict['header_normal_modify_allow'] & config_dict['describe_header_modify']:
  • str_describe_header = self.add_normal_header_according_to_protocol(str_describe_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['describe_header_modify']:
  • str_describe_header = self.add_overload_header_according_to_protocol(str_describe_header)
  • self.socket_send.send(str_describe_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the first DESCRIBE response is :')
  • print(msg_recv_dict[0])
  • print('\nnow we will execute second DESCRIBE for auth')
  • realm_value = 'RTSP SERVER'
  • nonce_value = 'e29027990294f81b941b04a7ac78c196'
  • str_describe_auth_header = self.gen_describe_auth_header(url, realm_value, nonce_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['describe_auth_header_modify']:
  • str_describe_auth_header = self.add_normal_header_according_to_protocol(str_describe_auth_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['describe_auth_header_modify']:
  • str_describe_auth_header = self.add_overload_header_according_to_protocol(str_describe_auth_header)
  • self.socket_send.send(str_describe_auth_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the second DESCRIBE response is :')
  • print(msg_recv_dict[0])
  • print('\nnow we will execute first SETUP for session')
  • str_setup_header = self.gen_setup_header(url, realm_value, nonce_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['setup_header_modify']:
  • str_setup_header = self.add_normal_header_according_to_protocol(str_setup_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['setup_header_modify']:
  • str_setup_header = self.add_overload_header_according_to_protocol(str_setup_header)
  • self.socket_send.send(str_setup_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the first SETUP response is :')
  • print(msg_recv_dict[0])
  • print('\nnow we will execute second SETUP')
  • session_value = '464314414585882'
  • str_setup_session_header = self.gen_setup_session_header(url, realm_value, nonce_value, session_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['setup_session_header_modify']:
  • str_setup_session_header = self.add_normal_header_according_to_protocol(str_setup_session_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['setup_session_header_modify']:
  • str_setup_session_header = self.add_overload_header_according_to_protocol(str_setup_session_header)
  • self.socket_send.send(str_setup_session_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the second SETUP response is :')
  • print(print(msg_recv_dict[0]))
  • print('\nnow we wil execute PLAY')
  • str_play_header = self.gen_play_header(url, realm_value, nonce_value, session_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['play_header_modify']:
  • str_play_header = self.add_normal_header_according_to_protocol(str_play_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['play_header_modify']:
  • str_play_header = self.add_overload_header_according_to_protocol(str_play_header)
  • self.socket_send.send(str_play_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the PLAY response is :')
  • print(msg_recv_dict[0])
  • print('\nnow we will execute GET_PARAMETER')
  • str_get_parameter_header = self.gen_get_parameter_header(url, realm_value, nonce_value, session_value, '1')
  • if config_dict['header_normal_modify_allow'] & config_dict['get_parameter_header_modify']:
  • str_get_parameter_header = self.add_normal_header_according_to_protocol(str_get_parameter_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['get_parameter_header_modify']:
  • str_get_parameter_header = self.add_overload_header_according_to_protocol(str_get_parameter_header)
  • self.socket_send.send(str_get_parameter_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the GET_PARAMETER response is :')
  • print(msg_recv_dict[0])
  • print('\nnow we will execute TEARDOWN to disconnect with server')
  • str_teardown_header = self.gen_teardown_header(url, realm_value, nonce_value, session_value)
  • if config_dict['header_normal_modify_allow'] & config_dict['teardown_header_modify']:
  • str_teardown_header = self.add_normal_header_according_to_protocol(str_teardown_header)
  • elif config_dict['header_overload_modify_allow'] & config_dict['teardown_header_modify']:
  • str_teardown_header = self.add_overload_header_according_to_protocol(str_teardown_header)
  • self.socket_send.send(str_teardown_header.encode())
  • msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
  • msg_recv_dict = msg_recv.split('\r\n')
  • print('the GET_PARAMETER response is :')
  • print(msg_recv_dict[0])
  • print('program execute finished, thank you')
  • self.socket_send.close()
  • def __del__(self):
  • # self.socket_send.close()
  • pass
  • if __name__ == '__main__':
  • rtsp_client = RtspClient()
  • rtsp_client.exec_full_request()
  • #rtsp_client.exec_force_request()
方便获取更多学习、工作、生活信息请关注本站微信公众号城东书院 微信服务号城东书院 微信订阅号
推荐内容
相关内容
栏目更新
栏目热门