# Informational # Bang on RTP by # 1) giving an evil payload (with $) # 2) Giving evil content (SDP starting with $) # 3) packing rtp after headers, after content, and at the start RTSP RTP # Server-side RTSP/1.0 200 OK Server: RTSPD/libcurl-test Session: asdf CSeq: 1 RTSP/1.0 200 OK Server: RTSPD/libcurl-test CSeq: 2 Session: asdf RTSP/1.0 200 OK Server: RTSPD/libcurl-test Cseq: 3 Content-Length: 4 Content-Type: fake/evil $99 RTSP/1.0 200 OK Server: RTSPD/libcurl-test Session: asdf CSeq: 4 rtp: part 2 channel 1 size 10 rtp: part 2 channel 0 size 500 rtp: part 2 channel 0 size 196 rtp: part 2 channel 0 size 124 rtp: part 2 channel 0 size 824 rtp: part 3 channel 1 size 10 rtp: part 3 channel 0 size 50 rtp: part 4 channel 0 size 798 rtp: part 4 channel 0 size 42 rtp: part 4 channel 1 size 30 rtp: part 4 channel 0 size 2048 rtp: part 4 channel 0 size 85 rtp: part 4 channel 1 size 24 # Client-Side rtsp lib571 RTSP RTP Interleaving Test rtsp://%HOSTIP:%RTSPPORT/571 log/protofile.txt RTP: message size 10, channel 1 RTP: message size 500, channel 0 RTP: message size 196, channel 0 RTP: message size 124, channel 0 RTP: message size 824, channel 0 RTP: message size 10, channel 1 RTP: message size 50, channel 0 RTP: message size 798, channel 0 RTP: message size 42, channel 0 RTP: message size 30, channel 1 RTP: message size 2048, channel 0 RTP: message size 85, channel 0 RTP: message size 24, channel 1 $99