File: README.md

package info (click to toggle)
sipvicious 0.3.0-2
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, sid
  • size: 336 kB
  • sloc: python: 3,246; makefile: 3
file content (51 lines) | stat: -rw-r--r-- 1,351 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
# Welcome to SIPVicious security tools

The 5 tools that you should be looking at are:

- svmap
- svwar
- svcrack
- svreport
- svcrash

![logo](http://1.bp.blogspot.com/-zIJlVWzVCu4/V0Rxz6pbjYI/AAAAAAAABEc/hFEJ6o8yCrcizEo7hvFG6kldNtrKJxMPgCK4B/s1600/sipvicious-web.png)

## The tools

svmap

	this is a sip scanner. When launched against
	ranges of ip address space, it will identify any SIP servers 
	which it finds on the way. Also has the option to scan hosts 
	on ranges of ports.

svwar

	identifies working extension lines on a PBX. A working 
	extension is one that can be registered. 
	Also tells you if the extension line requires authentication or not. 

svcrack
	
	a password cracker making use of digest authentication. 
	It is able to crack passwords on both registrar servers and proxy 
	servers. Current cracking modes are either numeric ranges or
	words from dictionary files.

svreport

	able to manage sessions created by the rest of the tools
	and export to pdf, xml, csv and plain text.

svcrash
	
	responds to svwar and svcrack SIP messages with a message that
	causes old versions to crash. 

For usage help make use of `-h` or `--help` switch.

Also check out the [wiki](https://github.com/sandrogauci/sipvicious/wiki)

And if you're stuck you're welcome to contact the author.

[Sandro Gauci](mailto:sandro@enablesecurity.com)