SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.
To get started read the following:
- Getting started on the Wiki
- Communication Breakdown blog: Attacking a real VoIP System with SIPVicious OSS.
For usage help make use of -h
or --help
switch.
If you are looking for professional VoIP and WebRTC penetration testing services, please check out our offerings at Enable Security.
The SIPVicious OSS toolset consists of the following tools:
- svmap
- svwar
- svcrack
- svreport
- svcrash
this is a sip scanner. When launched against
ranges of ip address space, it will identify any SIP servers
which it finds on the way. Also has the option to scan hosts
on ranges of ports.
Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage>
identifies working extension lines on a PBX. A working
extension is one that can be registered.
Also tells you if the extension line requires authentication or not.
Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage>
a password cracker making use of digest authentication.
It is able to crack passwords on both registrar servers and proxy
servers. Current cracking modes are either numeric ranges or
words from dictionary files.
Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage>
able to manage sessions created by the rest of the tools
and export to pdf, xml, csv and plain text.
Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage>
responds to svwar and svcrack SIP messages with a message that
causes old versions to crash.
Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ>
Please refer to the installation documentation.
Check out the wiki for documentation.