Pyllywood
Pyllywood copied to clipboard
Hollywood-style CCTV hacking - PoC
Features
- Basic authentication brute force
- Digest authentication brute force
- Credentials-first devices
- Route-first devices (Needs testing)
- Masscan usage for extreme scan speed
- Multi-threaded attacks
How to run
python pyllywood.py -t IP/CIDR
This is a Proof of Concept. The source code is refactored and now it works well agains Basic and Digest authentication devices. I've tried to include comments to allow you understand my logic behind it. ANY CONTRIBUTE IS APPRECIATED!
Help is needed to complete the following:
- Extensive tests especially for Route-first devices (devices that require the stream path to be known) from people who actually own such devices since i don't
- Implement an export function (M3U8 files for VLC, or even iSpy if possible)
- Add support for other protocols (anything that iSpy supports)
- Add support for devices that do not require authentication
- Create a requirements.txt for easy installation
- Create a single executable
Multi-threading is back!
PyLLyWOOD
Hollywood-style CCTV hacking - PoC
Contribution notes:
- DO NOT use PyCurl for RTSP! Use sockets library instead.
- Some devices respond with 200 even if the path is wrong. We need a way to handle those.
- Some devices terminate the connection when a valid path with valid credentials is accessed with "DESCRIBE" request, not respecting RFC. If we want to find even more paths or more credentials, the connections have to be looped again and again.
- Some devices require a valid username and password at first place, while others require a valid path. Test your device manually before any pull-request.
- Some devices respond with 401 when a valid path is found, while others respond with 403.
- A complete RFC-respective conversation can be used to validate streams ("SETUP" and "PLAY" requests), but it doesn't seem to matter at all. I am using only "DESCRIBE" requests. Keep it that way.
- Some devices respond with 200 no matter what. I assume these are devices with either no authentication or honeypots (?).
Special thanks to:
- Ullaakut for his AWESOME project Cameradar which was my inspiration and for helping me understand how the RTSP logic flows!
- iSpy Software Developers for their huge list of CCTV XML!
- Any of you for contributing!