Need help with sipvicious?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

EnableSecurity
609 Stars 141 Forks Other 459 Commits 0 Opened issues

Description

SIPVicious OSS has been around since 2007 and is actively updated to help security teams, QA and developers test SIP-based VoIP systems and applications.

Services available

!
?

Need anything else?

Contributors list

Welcome to SIPVicious OSS security tools

SIPVicious mascot

SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.

To get started read the following:

For usage help make use of

-h
or
--help
switch.

A note to vendors and service providers

If you are looking for a professional grade toolset to test your RTC systems, please consider SIPVicious PRO.

The tools

The SIPVicious OSS toolset consists of the following tools:

  • svmap
  • svwar
  • svcrack
  • svreport
  • svcrash

svmap

this is a sip scanner. When launched against
ranges of ip address space, it will identify any SIP servers 
which it finds on the way. Also has the option to scan hosts 
on ranges of ports.

Usage: https:

svwar

identifies working extension lines on a PBX. A working 
extension is one that can be registered. 
Also tells you if the extension line requires authentication or not. 

Usage: https:

svcrack

a password cracker making use of digest authentication. 
It is able to crack passwords on both registrar servers and proxy 
servers. Current cracking modes are either numeric ranges or
words from dictionary files.

Usage: https:

svreport

able to manage sessions created by the rest of the tools
and export to pdf, xml, csv and plain text.

Usage: https:

svcrash

responds to svwar and svcrack SIP messages with a message that
causes old versions to crash. 

Usage: https:

Installation

Please refer to the installation documentation.

Further information

Check out the wiki for documentation.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.