■ ■ ■ ■ ■ ■
rtspbrute/modules/attack.py
| skipped 28 lines |
29 | 29 | | credentials = target.credentials |
30 | 30 | | |
31 | 31 | | # Create socket connection. |
32 | | - | ok = target.connect(port) |
33 | | - | if not ok: |
| 32 | + | connected = target.connect(port) |
| 33 | + | if not connected: |
34 | 34 | | if logger_is_enabled: |
35 | 35 | | if target.status is Status.UNIDENTIFIED: |
36 | 36 | | logger.debug(f"Failed to connect {target}:", exc_info=target.last_error) |
| skipped 1 lines |
38 | 38 | | logger.debug(f"Failed to connect {target}: {target.status.name}") |
39 | 39 | | return False |
40 | 40 | | |
41 | | - | attack_url = RTSPClient.get_rtsp_url(target.ip, port, credentials, route) |
42 | 41 | | # Try to authorize: create describe packet and send it. |
43 | | - | ok = target.authorize(port, route, credentials) |
44 | | - | request = "\n\t".join(target.packet.split("\r\n")).rstrip() |
45 | | - | if target.data: |
46 | | - | response = "\n\t".join(target.data.split("\r\n")).rstrip() |
47 | | - | else: |
48 | | - | response = "" |
| 42 | + | authorized = target.authorize(port, route, credentials) |
49 | 43 | | if logger_is_enabled: |
| 44 | + | request = "\n\t".join(target.packet.split("\r\n")).rstrip() |
| 45 | + | if target.data: |
| 46 | + | response = "\n\t".join(target.data.split("\r\n")).rstrip() |
| 47 | + | else: |
| 48 | + | response = "" |
50 | 49 | | logger.debug(f"\nSent:\n\t{request}\nReceived:\n\t{response}") |
51 | | - | if not ok: |
| 50 | + | if not authorized: |
52 | 51 | | if logger_is_enabled: |
| 52 | + | attack_url = RTSPClient.get_rtsp_url(target.ip, port, credentials, route) |
53 | 53 | | logger.debug( |
54 | 54 | | f"Failed to authorize {attack_url}", exc_info=target.last_error |
55 | 55 | | ) |
| skipped 132 lines |