svmap - Man Page

manual page for svmap.py v0.3.3

Synopsis

svmap.py [options] host1 host2 hostrange

Description

Scans for SIP devices on a given network

examples:

svmap.py 10.0.0.1-10.0.0.255 172.16.131.1 sipvicious.org/22 10.0.1.1/241.1.1.1-20 1.1.2-20.* 4.1.*.*

svmap.py -s session1 --randomize 10.0.0.1/8

svmap.py --resume session1 -v

svmap.py -p5060-5062 10.0.0.3-20 -m INVITE

Options

--version

show program's version number and exit

-h,  --help

show this help message and exit

-v,  --verbose

Increase verbosity

-q,  --quiet

Quiet mode

-p PORT, --port=PORT

Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100

-P PORT, --localport=PORT

Source port for our packets

-x IP, --externalip=IP

IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT

-b BINDINGIP, --bindingip=BINDINGIP

By default we bind to all interfaces. This option overrides that and binds to the specified ip address

-t SELECTTIME, --timeout=SELECTTIME

This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.

-R,  --reportback

Send the author an exception traceback. Currently sends the command line parameters and the traceback

-A,  --autogetip

Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.

-s NAME, --save=NAME

save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans

--resume=NAME

resume a previous scan

-c,  --enablecompact

enable compact mode. Makes packets smaller but possibly less compatible

--randomscan

Scan random IP addresses

-i scan1, --input=scan1

Scan IPs which were found in a previous scan. Pass the session name as the argument

-I scan1, --inputtext=scan1

Scan IPs from a text file - use the same syntax as command line but with new lines instead of commas. Pass the file name as the argument

-m METHOD, --method=METHOD

Specify the request method - by default this is OPTIONS.

-d,  --debug

Print SIP messages received

--first=FIRST

Only send the first given number of messages (i.e. usually used to scan only X IPs)

-e EXTENSION, --extension=EXTENSION

Specify an extension - by default this is not set

--randomize

Randomize scanning instead of scanning consecutive ip addresses

--srv

Scan the SRV records for SIP on the destination domain name.The targets have to be domain names - example.org domain1.com

--fromname=FROMNAME

Specify a name for the from header in requests

-6,  --ipv6

Scan an IPv6 address

SIPvicious SIP scanner searches for SIP devices on a given network.

Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program.  If not, see <http://www.gnu.org/licenses/>.

See Also

The full documentation for svmap.py can be found on GitHub at <https://github.com/enablesecurity/sipvicious/wiki>.

Info

June 2020 svmap.py v0.3.3