table of contents
SVWAR(1) | User Commands | SVWAR(1) |
NAME¶
svwar.py - extension line scanner
SYNOPSIS¶
svwar.py [options] target
DESCRIPTION¶
examples: svwar.py -e100-999 udp://10.0.0.1:5080 svwar.py -d dictionary.txt 10.0.0.2
OPTIONS¶
- --version
- show program's version number and exit
- -h, --help
- show this help message and exit
- -v, --verbose
- Increase verbosity
- -q, --quiet
- Quiet mode
- -p PORT, --port=PORT
- Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100
- -P PORT, --localport=PORT
- Source port for our packets
- -x IP, --externalip=IP
- IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT
- -b BINDINGIP, --bindingip=BINDINGIP
- By default we bind to all interfaces. This option overrides that and binds to the specified ip address
- -t SELECTTIME, --timeout=SELECTTIME
- This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.
- -R, --reportback
- Send the author an exception traceback. Currently sends the command line parameters and the traceback
- -A, --autogetip
- Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.
- -s NAME, --save=NAME
- save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans
- --resume=NAME
- resume a previous scan
- -c, --enablecompact
- enable compact mode. Makes packets smaller but possibly less compatible
- -d DICTIONARY, --dictionary=DICTIONARY
- specify a dictionary file with possible extension names or - for stdin
- -m OPTIONS, --method=OPTIONS
- specify a request method. The default is REGISTER. Other possible methods are OPTIONS and INVITE
- -e RANGE, --extensions=RANGE
- specify an extension or extension range example: -e 100-999,1000-1500,9999
- -z PADDING, --zeropadding=PADDING
- the number of zeros used to padd the username. the options "-e 1-9999 -z 4" would give 0001 0002 0003 ... 9999
- --force
- Force scan, ignoring initial sanity checks.
- -T TEMPLATE, --template=TEMPLATE
- A format string which allows us to specify a template for the extensions example svwar.py -e 1-999 --template="123%#04i999" would scan between 1230001999 to 1230999999"
- -D, --enabledefaults
- Scan for default / typical extensions such as 1000,2000,3000 ... 1100, etc. This option is off by default. Use --enabledefaults to enable this functionality
- --maximumtime=MAXIMUMTIME
- Maximum time in seconds to keep sending requests without receiving a response back
- --domain=DOMAIN
- force a specific domain name for the SIP message, eg. -d example.org
- --debug
- Print SIP messages received
- -6
- Scan an IPv6 address
- Sipvicious extension line scanner scans SIP PaBXs for valid extension
lines.
Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>
- This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
- This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
- You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>.
SEE ALSO¶
The full documentation for svwar.py can be found on GitHub at <https://github.com/enablesecurity/sipvicious/wiki>.
June 2020 | svwar.py v0.3.3 |