Tikfollowers

Rtsp exploit. html>el

More specifically, three typical buffer overflow vulnerabilities were discovered in Hikvision's RTSP request handling RFC 2326 Real Time Streaming Protocol April 1998 1 Introduction 1. 5. Cameradar allows you to. It appears that firmware versions 5. rhosts files along with /etc/hosts. threads. 摄像头 Sep 7, 2022 · We can get into a RTSP stream using these 2 types of attack. 0. Alternatively, you can also use this URL (Main Stream by default): rtsp://(user name):(password)@(ip address):554/ For example, if your device IP address is 192. com/exploits/51017Exploit by: https://twitter. This report discloses serious vulnerabilities (with proof of concept (PoC) code) of DVR/NVR devices built using the HiSilicon hi3520d and similar system on a chip (SoC). Detect open RTSP hosts on any accessible target host; Detect which device model is streaming Jun 27, 2024 · RTSP: Real-time streaming protocol. It has a visually appealing user interface and no ongoing license costs. Metasploit Framework. the same command works on Linux/Mac without the need to CD to the installed DIR. Mar 1, 2012 · Attacking the FTP Service. It utilizes TCP port 1723 for the exchange of keys, while IP protocol 47 (Generic Routing Encapsulation, or GRE ), is used to encrypt the data that is transmitted between peers. Upload your live stream to YouTube, Twitch, Facebook, Vimeo, or other streaming solutions like Wowza. 2. Nov 9, 2016 · I nmapped and found it is listening on 8554/tcp port for rtsp. , client_port=[custom_port]-[custom_port+1]). HiSilicon DVR hack. You signed out in another tab or window. 20 is required. scanner = RTSPScanner() # Set address to net wth CIDR notation or single host. Results 01 - 20 of 164,950 in total. Network. 110:8554 satip error: Failed to setup RTSP session-- logger module stopped -- Aug 29, 2003 · Two of the plug-ins installed by default can be used to exploit a heap-based buffer overflow in a RTSP protocol parser. This article discloses critical vulnerabilities in IPTV/H. 0 client and server library for the Go programming language, written for MediaMTX. 3. You signed in with another tab or window. The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. It does not typically deliver the continuous streams itself, although interleaving of the continuous media This is a full list of arguments supported by the rtsp-url-brute. https://github. To associate your repository with the dahua topic, visit your repo's landing page and select "manage topics. 0 and below there are default login details. RTSP provides an extensible framework to enable controlled, on-demand If RTSP authentication is set to basic, an attacker could send a specially-crafted request to TCP port 554 in order to bypass authentication and gain access to the RTSP live video stream. 0R 1. Supported platform (s): OSX. Because the vulnerable code is in a component that both RTSP clients and servers share in the Live555 library, an attacker can exploit this against Live555-based RTSP servers as well (including VLC). The vulnerability is a stack-based buffer overflow affecting RTSP parsing on port 554. 15 - Remote Code Execution (RCE)Exploit-DB: https://www. The DVRs appear to be Dec 8, 2020 · RTSP Hacking made easy. RFC 2326 Real Time Streaming Protocol April 1998 1 Introduction 1. It was developed by the Internet Engineering Task Force (IETF) in 1998 as a standardized way to control and deliver real-time multimedia content, such as live video and audio, over a network. To associate your repository with the rtsp topic, visit your repo's landing page and select "manage topics. That's the universal standard and if your device is following it you will be able to use this port. urlfile. Basic Information. Tool for RTSP that brute-forces routes and In Active FTPthe FTP clientfirst initiatesthe control connectionfrom its port N to FTP Servers command port – port 21. You switched accounts on another tab or window. FTP is a service that is commonly used in Web Servers from Webmasters for accessing the files remotely. To associate your repository with the ezviz topic, visit your repo's landing page and select "manage topics. This function contains an exploit that an attacker could use to cause a null pointer deference, resulting in a denial of Aug 6, 2023 · RTSP is an application level network protocol designed for multiplexing and packetizing multimedia transport streams over a suitable transport protocol. The reason is pretty obvious: this project started as a RTSP server but has evolved into a much more versatile product that is not tied to the RTSP protocol anymore. ) There are four preference settings affecting RTSP. Nov 7, 2013 · 7. scanner. The Hikvision DVR devices record video feeds of surveillance cameras and offer remote administration and playback of recorded footage. Sets an alternate URL dictionary file. Possible attack vectors include. 168. mode = "scan". A community-driven platform offering Roblox exploits, hacks, cheats, and a developers forum. Ant Media Server is auto-scalable and it can run on-premise or on-cloud. Jan 1, 2007 · Description. We’ll come back to this port for the web apps installed. com 80 openssl s_client -connect domain. Screen shot above from 3. Anyone could find even the latest saved screenshots of what the cameras see, said Cybernews researchers. The Oct 8, 2022 · TP-Link Tapo c200 1. Dec 30, 2013 · An attacker can easily use this to force VLC to connect to a malicious RTSP server and compromise the victim’s system. GStreamer contains gst-rtsp-server, an open-source library that allows the user to build RTSP servers. 68. I wanted to disable the cloud and enable rtsp on mine so in the end I opened it and hooked up to the uart diagnostic, faced with a Unix login prompt, no easily guessed passwords. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. IMPORTANT: To view the RTSP stream over the internet Apr 26, 2021 · Since the discovery of this exploit the Furbo has had multiple firmware updates, but they do not appear to have patched the underlying RTSP vulnerability. g. # Set to scan mode (add/rem to/from rtsp-simple-server still under development and considered alpha) scanner. There is a DoS vulnerability in RTSP module of Leland-AL00A Huawei smart phones versions earlier than Leland-AL00A 9. Sep 2, 2021 · The Exploit Database is a non-profit project that is provided as a public service by OffSec. 网络摄像机作为安防设备,被广泛的用于交通、学校、企业、商场等公共场所。. Here's how to find IP cameras on your network using nmap on windows. code of Hikvision DVR appliances. Attempts to enumerate RTSP media URLS by testing for common paths on devices such as surveillance IP cameras. py - A quick and simple tool to brute force credentials on RTSP services and devices. Jan 2, 2019 · PORT STATE SERVICE VERSION 80/tcp open http Boa httpd 443/tcp open ssl/http Boa httpd 554/tcp open rtsp Vivotek FD8134V webcam rtspd 8080/tcp open http Boa httpd From the resulting information, we can see that the FD8369A-V appears to be hosting a web application interface on a Boa web server, as well as a real-time streaming protocol service 3 days ago · These vulnerabilities are utilized by our vulnerability management tool InsightVM. Play (read) Read media streams from servers with the UDP, UDP-multicast or TCP transport protocol. The reliability of our exploit has decreased because the RTSP service on the test devices more frequently goes into a bad state requiring the device to be fully power cycled before continuing. Our aim is to serve the most comprehensive collection of exploits gathered Dec 6, 2017 · Add this topic to your repo. It exploits a vulnerability in Shenzhen TVT DVR NVMS-9000. when trying to connect via VLC, it prompts for authentication. But, if the FTP Client has a firewall setup that controls This Metasploit module exploits a buffer overflow in the RTSP request parsing code of Hikvision DVR appliances. x are susceptible to this issue. In this article we got information about the services running and Apr 10, 2023 · RTSP (Real Time Streaming Protocol) Pentesting Restricted Shell (rbash, rzsh) Bypass SNMP (Simple Network Management Protocol) Pentesting Vulnerability Assessment Menu Toggle. SIPDigestLeak vulnerability. by Paul Kimayong. py rtsp_authgrind. They are utilized by popular media players such as VLC and MPlayer, as well as a multitude of embedded devices (mainly cameras). The vulnerability is present in several models / firmware versions but due to the available test Real Time Streaming Protocol (RTSP) is an application-level protocol for the transfer of real-time media data. To use these script arguments, add them to the Nmap command line using the --script-args arg1=value,[arg2=value,. List of CVEs: CVE-2007-6166. Jan 10, 2008 · The problem is a buffer-overflow which happens during the filling of. https:/ Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera - hacefresko/CVE-2021-4045-PoC rtsp: Gives access to the live May 17, 2018 · Enter the DVR / NVR IP address, located under your Network menu or System Information on your DVR / NVR. So it is almost impossible not to find this service in one of our clients systems during an engagement. CVE-2022-26259 is a newer Xiongmai vulnerability that was found by Chris Leech. Successful exploit could cause the affected phone abnormal, leading to a DoS condition. The clientthen listensto port N+1and sends the port N+1 to FTP Server. Features: Client. The issue is in the binary rtspd (in /sbin) when parsing a long "Authorization: Basic" RTSP header. UPnP is a network protocol that allow devices to discover and interact with each other seamlessly over a local network. It seems to accept admin 123456 but disconnects immediately with the following in the log. equiv were utilized by Rsh. Nov 8, 2013 · The Exploit Database is a non-profit project that is provided as a public service by OffSec. The protocol is used to establish and control media sessions between end points by serving as a network-remote-control for time-synchronized streams of continuous media such as audio and video. We would like to show you a description here but the site won’t allow us. Tapo C310 RTSP server v1. This module was inspired by MOAB-01-01-2007. Our aim is to serve the most comprehensive collection of exploits gathered Internal IP Address disclosure. RTSP was developed by the Multiparty Note about rtsp-simple-server. Preference Settings (Text below needs update. This article suggests a method for creating and implementing a security layer for RTSP-based Streaming Servers. Reload to refresh your session. your username. 22/tcp open ssh syn-ack. Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security. Our vulnerability and exploit database is updated frequently and contains the most recent security research. Go ≥ 1. Target service / protocol: -. Jan 24, 2007 · A vulnerability exists in the way Apple QuickTime handles specially crafted Real Time Streaming Protocol (RTSP) URL strings. However, this can be a challenging vulnerability to exploit: If an attacker has managed to insert themselves into the SIP traffic flow (a “man in the middle” attack), the attacker must send an RTP packet faster than the valid source. RTSP TCP Port: This preference specifies the first of the TCP ports on which the RTSP dissector will check for traffic. Default ports are 1900 (UDP) and 5000 (TCP). This setup is crucial for establishing a secure communication Aug 25, 2003 · The Exploit Database is a non-profit project that is provided as a public service by OffSec. ]syntax. Set the camera RTSP authentication to 'basic'. 0/24. Apr 8, 2023 · As RTSP protocol is designed same as HTTP Protocol thus bad implementation related to exploit vulnerabilities which can occur during streaming media. exploit-db. Use it in a python3 project as a class: from rtspscanner import RTSPScanner. Are you looking for the RTSP port number for cameras ? The RTSP number for cameras, DVRs and NVRs is the 554. This method shares similarities in impact with DNS rebinding but is simpler to exploit. It also remains the standard in many Sep 27, 2017 · The issue where Asterisk would lock onto the first RTP packet received as a valid source is much more serious. Mar 27, 2020 · March 27, 2020. Nmap: Network scanning tool to discover devices and open ports. The RTSP dissector is fully functional over TCP, but currently doesn't handle RTSP-over-UDP. This module can be used to read the stored password of a vulnerable Apple Airport Extreme access point. Our aim is to serve the most comprehensive collection of exploits gathered rtsp_authgrinder. 443/TCP - HTTPS (Hypertext Transport Protocol Secure) - encrypted using Transport Layer Security or, formerly, Secure Sockets Layer. so. Real-time streaming protocol (RTSP) is a network protocol that controls how the streaming of a media should occur between a server and a client. Smaller number leads to more successful screenshots: when there's too much threads PyAV will throw errors and wouldn't connect to target. Remote attackers could trick the user into opening a malformed RTSP media stream to exploit this vulnerability. Cameradar is a Go-based tool to hack RTSP Video Surveillance CCTV Cameras, it can detect open RTSP hosts, detect device models and launch automated attacks. *Technical Description / Proof of Concept Code* 7. 101 (obviously, not an IP address of a real camera), we would simply enter; A subreddit dedicated to hacking and hackers. 1 Purpose The Real-Time Streaming Protocol (RTSP) establishes and controls either a single or several time-synchronized streams of continuous media such as audio and video. . Route Bruteforce; Basic Authorization using RTSP Header/GET parameter (Authentication based on know credentials) Route Bruteforce: Nov 15, 2023 · According to the Shodan search engine, at least 8,373 real-time streaming protocol (RTSP) cameras are exposed worldwide. For authentication, . SSH servers: The LIVE555 Media Libraries are a lightweight set of multimedia streaming libraries for RTSP/RTCP/RTSP/SIP, with code support for both servers and clients. Public exploit code is available that demonstrates how opening a . Add this topic to your repo. 9. However, we have confirmed that other attack vectors for the vulnerability also exist. Found the main rom and tried to dump the OS, didn’t work, desoldered the chip and managed to grab the OS. 3. multimedia framework. " GitHub is where people build software. Contribute to rapid7/metasploit-framework development by creating an account on GitHub. Nov 30, 2022 · CVE-2022-26259: RTSP Exploitation. 因此许多暴露在公网的网络摄像机也成了黑客眼中的目标。. Exploiting the vulnerabilities lead to unauthorized remote code execution (RCE) using only the web interface, causing full takeover of the exploited device Sep 15, 2020 · 15 Sep 2020. Moreover, it was common for the . RTSP port number for cameras, DVRs and NVRs. 111(C00E111R2P10T8). dll on Windows systems. Target network port (s): -. This may result in remote code execution or denial of service. com/Ullaakut/cameradar. May 30, 2018 · Description. Basically, RTSP is the protocol that describes what happens when you click "Pause"/"Play" when streaming a video. This module exploits a stack-based buffer overflow in Apple QuickTime before version 7. Last modified: 2023-02-25. Potential for development into full RCE with root permissions as the Sofia process runs as root on the DVR The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media Nov 28, 2007 · Welcome! Log into your account. com/hacefresko00:00 In Apr 26, 2023 · Real-Time Streaming Protocol (RTSP) is a network control protocol designed specifically for use in streaming media systems. com:443. The ease of spoofing IP addresses, notably on the local network, was a significant vulnerability. QTL file triggers the buffer overflow. Nov 1, 2023 · Step #2: Run the RTSP Credential Brute-forcer. and playback of recorded footage. Enter the channel number you would like to stream from. Oct 19, 2020 · The Exploit Database is a non-profit project that is provided as a public service by OffSec. 0 allows unauthenticated attackers to execute Denial of Service remotely, or possibly have unspecified other impact, via a Web camera viewer interface, a different vulnerability than CVE-2017-16725. Nothing will change regarding license, features and backward compatibility. For that reason we will try to cover in this article a scenario of a possible attack against the FTP Server. It does not typically deliver the continuous streams itself, although interleaving of the continuous media Oct 12, 2010 · An attacker could exploit the vulnerability by creating and sending a specially crafted RTSP packet to an affected system. . Note that any port can be used to run Point-to-Point Tunneling Protocol (PPTP) is a method widely employed for remote access to mobile devices. Now that you have docker and cameradar installed, you only need to point cameradar at the IP address of the camera that you want to brute-force! For instance, to brute force a camera at 192. Sets the maximum number of parallel threads to run. All vulnerabilities are exploitable remotely and can lead to sensitive information exposure, denial of service, and remote code RTSP 1. The exploit, first discovered back in 2017, is taking advantage of hard coded credentials in Shenzhen TVT DVRs web API interface that allow the Jun 17, 2022 · I have been trying to exploit a cheap smart tv box that I have bought a while ago and after my nmap scan I found that port 7000/tcp was open but researching about the port gave back not much information I even searched searchsploit and vulners for any information or vulnerabilities within the port but I couldn't find anything useful. Top 20 Microsoft Azure Vulnerabilities and Misconfigurations; CMS Vulnerability Scanners for WordPress, Joomla, Drupal, Moodle, Typo3. VulnCheck has successfully exploited this vulnerability for RCE on all of our Xiongmai Apr 29, 2019 · Port 80 is a good source of information and exploit as any other port. The vulnerabilities may be ­ mechanism. Default port: 22. rhosts files to be placed within the home Nov 24, 2014 · This module exploits a buffer overflow in the RTSP request parsing. : "-st, --screenshot-threads" ( 20 ): Set custom number of threads to screenshot the streams. Reflection of Origin in Access-Control-Allow-Origin The real-world scenario where the Origin header's value is reflected in Access-Control-Allow-Origin is theoretically improbable due to restrictions on combining these headers. the LCD-like screen containing info about the status of the connection. If your computer were a remote control and the Jul 23, 2023 · The discovery of this vulnerability is a reminder of the importance of responsible disclosure in the cybersecurity community. The vulnerability details were published in early 2022. 0. The SIP Digest Leak is a vulnerability that affects a large number of SIP Phones, including both hardware and software IP Phones as well as phone adapters (VoIP to analogue). Some cameras could even be found on Google, searching parts of default URLs commonly used by camera vendors. address = 192. The previous article covered how my hacking knowledge is extremely limited, and the intention of these articles is for an audience to see the progress of a non-technical layman when approaching ethical hacking. 2. I sourced these from the “cet” binary on the camera. 3 on Windows XP SP0/2; Firefox 3 blacklists the QuickTime plugin. 110 and the password is 111111, then your RTSP URL should be: Aug 14, 2020 · Each combination should contain : and be on a separate line, e. Aug 16, 2021 · The Exploit Database is a non-profit project that is provided as a public service by OffSec. What is RTSP? The Real Time Streaming Protocol (RTSP) is an application-level protocol for control over the delivery of data with real-time properties. 网络摄像机为方便管理员远程监控,一般会有公网IP(或端口映射),接入互联网。. 0 for RealSystem Server 7, 8, and RealServer G2) and vsrc 3260 . nse script: rtsp-url-brute. There is a facility on the app to set up a “Camera Account”, which adds user details for the RTSP server. The Hikvision DVR devices record. Com). RFC 2326, 7826. 6. your password The Restreamer is a complete streaming server solution for self-hosting. It is essential for maintaining the confidentiality and integrity of data when accessing remote systems. Multiple Vivotek IP Cameras products could allow a remote attacker to bypass security restrictions, caused by the failure to restrict access to the video stream. Metasploit: Framework for developing and executing exploit code. Responsible disclosure involves notifying the vendor (in this case, Hikvision) about the identified vulnerability and allowing them sufficient time to release a security patch before public disclosure. rtsp-url-brute. 0 and inside the response the Location header could point you to the internal IP address: nc -v domain. 0 for Helix Universal Server, vsrcplin. 0 The Microsoft Remote Procedure Call (MSRPC) protocol, a client-server model enabling a program to request a service from a program located on another computer without understanding the network's specifics, was initially derived from open-source software and later developed and copyrighted by Microsoft. but due to the available test device Feb 18, 2016 · RTSP 服务未授权访问漏洞. live555 error: Failed to connect with rtsp://192. 264/H. Sep 20, 2017 · The Hikvision IP Camera Backdoor is a magic string that Hikvision secretly included that easily allows backdooring the camera, regardless of the strength of Jul 14, 2022 · This time, I’ll be building on my newfound wisdom to try and exploit some open ports on one of Hack the Box’s machines. The vulnerability is present in several models / firmware versions. SSH (Secure Shell or Secure Socket Shell) is a network protocol that enables a secure connection to a computer over an unsecured network. The 'client_port' parameter in the RTSP SETUP request is manipulated, inducing a vulnerability in the RTSP server's format validation. Receive video data from OBS and publish it with the RTMP and SRT server. By sending an overly long RTSP response to a client, an attacker may be able to execute arbitrary code. 265 video encoders based on HiSilicon hi3520d hardware. Our aim is to serve the most comprehensive collection of exploits gathered Mar 28, 2023 · These Tapo cameras work via an app. Enter 1 if you want your camera to stream as substream, or enter 0 to stream as mainstream. TRENDnet ProView Wireless camera TV-IP512WN 1. On any IIS server where you get a 302 you can try stripping the Host header and using HTTP/1. Enter the RTSP port (default: 554 ). Response disclosing the internal IP: Feb 25, 2023 · UPnP (Universal Plug and Play) Pentesting. This protocol is similar to HLS, it cannot transmit live streaming data alone and require RTSP servers to work together with RTP and other protocols to accomplish their Apr 13, 2024 · In this tutorial, I'll demonstrate how to identify, access, and potentially exploit vulnerabilities in IP cameras using Kali Linux tools. The vulnerabilities exist in vendor application software running on these devices. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects. Mar 5, 2015 · But the other discussions surrounding actual Hikvision exploits talk about their DVRs in particular and the RTSP buffer overflow issue (wired article: Hackers Turn Security Camera DVRs Into Worst Bitcoin Miners Ever | WIRED, SecurityWeek article: Multiple Vulnerabilities Found in Hikvision DVR Devices | SecurityWeek. Jul 8, 2021 · Real-Time Streaming Protocol (RTSP) was one of the favorite video technologies in the streaming world before RTMP which is not supported anymore and the HTML5 protocols that are currently breakthrough technology in the streaming world. Default ports are 554, 8554. RTSP is still one of the most preferred protocols for IP cameras. a rtsp:// link, if the port 554 of the server is closed Quicktime will. Unfortunately if you don’t set up the user details on versions 1. Nov 19, 2014 · Rapid7 Labs has found multiple vulnerabilities in Hikvision DVR (Digital Video Recorder) devices such as the DS-7204 and other models in the same product series that allow a remote attacker to gain full control of the device. There's a video by the end of this article to help you find the RTSP for your cameras. Authentication was dependent on IP addresses and the Domain Name System (DNS). class MetasploitModule < Msf:: Exploit:: Remote: Rank = NormalRanking: include Exploit:: Remote:: Tcp: def initialize (info = {}) super (update_info (info, 'Name' => 'Hikvision DVR RTSP Request Remote Code Execution', 'Description' => %q{This module exploits a buffer overflow in the RTSP request parsing: code of Hikvision DVR appliances. Servers. The script attempts to discover valid RTSP URLs by sending a DESCRIBE request for each URL in the dictionary. FTP Serverthen initiatesthe data connection, from its port M to the port N+1of the FTP Client. 1. The vulnerability allows leakage of the Digest authentication response, which is computed from the password. x as well as 5. The Real-Time Streaming Protocol ( RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams (such as interactive media, video and audio) over a suitable transport protocol. Buffer overflow in XiongMai uc-httpd 1. RTSP is used in entertainment and communications systems to control streaming media servers. The Browser target for this module was tested against IE 6 and Firefox 1. Our aim is to serve the most comprehensive collection of exploits gathered This module exploits a buffer overflow in the RTSP request parsing. Read TLS-encrypted streams (TCP only) Switch transport protocol HTTP (Hypertext Transfer Protocol), is an application-level protocol for distributed, collaborative, hypermedia information systems. so on UNIX platforms ( vsrcplin. *RTSP Authentication Bypass* This vulnerability is triggered by sending specially crafted RTSP packets to remote TCP port 554. In order to run the proof of concept, follow the next steps: 1. Unlike conventional exploits with a specific overflow value, this vulnerability is triggered by improper formatting, particularly when the 'client_port' is not in the expected format (e. Ant Media Server is a live streaming engine software that provides adaptive, ultra low latency streaming by using WebRTC technology with ~0. Query servers about available media streams. video feeds of surveillance cameras and offer remote administration. android ios streaming h264 stream rtsp mp4 hls livestream rtmp webrtc ip-camera android-sdk broadcasting media Mar 23, 2020 · Cisco Talos recently discovered a denial-of-service vulnerability in GStreamer, a pipeline-based. Kali Linux Terminal (Machine) 1. For exploiting this vulnerability is only needed that an user follows. Only a small number of firmware versions have the WDBRPC service running, however the factory configuration was vulnerable. This module exploits a buffer overflow in Apple QuickTime 7. They are View Source plug-ins vsrcplin. This is a multi-threaded brute forcing tool for testing, assessment and audit purposes only. May 13, 2020 · Description. There are two main ports: 80/TCP - HTTP. Sep 15, 2022 · RTSP is a legacy protocol originally developed with entertainment in mind, its primary use is establishing and controlling media sessions, like tv and movies, between endpoints. 4 is vulnerable to an unauthenticated stack-based buffer overflow in handling RTSP packets. 5 seconds latency. Juniper Threat Labs has been monitoring an IoT botnet that has been active in the wild since October 2, 2019. rtsp-simple-server has been rebranded as MediaMTX. uj at vo tg oy ty el yc dk id