svwar - Man Page

manual page for svwar.py v0.3.3

Synopsis

svwar.py [options] target

Description

examples: svwar.py -e100-999 udp://10.0.0.1:5080 svwar.py -d dictionary.txt 10.0.0.2

Options

--version

show program's version number and exit

-h,  --help

show this help message and exit

-v,  --verbose

Increase verbosity

-q,  --quiet

Quiet mode

-p PORT, --port=PORT

Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100

-P PORT, --localport=PORT

Source port for our packets

-x IP, --externalip=IP

IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT

-b BINDINGIP, --bindingip=BINDINGIP

By default we bind to all interfaces. This option overrides that and binds to the specified ip address

-t SELECTTIME, --timeout=SELECTTIME

This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.

-R,  --reportback

Send the author an exception traceback. Currently sends the command line parameters and the traceback

-A,  --autogetip

Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.

-s NAME, --save=NAME

save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans

--resume=NAME

resume a previous scan

-c,  --enablecompact

enable compact mode. Makes packets smaller but possibly less compatible

-d DICTIONARY, --dictionary=DICTIONARY

specify a dictionary file with possible extension names or - for stdin

-m OPTIONS, --method=OPTIONS

specify a request method. The default is REGISTER. Other possible methods are OPTIONS and INVITE

-e RANGE, --extensions=RANGE

specify an extension or extension range  example: -e 100-999,1000-1500,9999

-z PADDING, --zeropadding=PADDING

the number of zeros used to padd the username. the options "-e 1-9999 -z 4" would give 0001 0002 0003 ... 9999

--force

Force scan, ignoring initial sanity checks.

-T TEMPLATE, --template=TEMPLATE

A format string which allows us to specify a template for the extensions                       example svwar.py -e 1-999 --template="123%#04i999" would scan between 1230001999 to 1230999999"

-D,  --enabledefaults

Scan for default / typical extensions such as 1000,2000,3000 ... 1100, etc. This option is off by default.                       Use --enabledefaults to enable this functionality

--maximumtime=MAXIMUMTIME

Maximum time in seconds to keep sending requests without                       receiving a response back

--domain=DOMAIN

force a specific domain name for the SIP message, eg. -d example.org

--debug

Print SIP messages received

-6

Scan an IPv6 address

Sipvicious extension line scanner scans SIP PaBXs for valid extension lines.

Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program.  If not, see <http://www.gnu.org/licenses/>.

See Also

The full documentation for svwar.py can be found on GitHub at <https://github.com/enablesecurity/sipvicious/wiki>.

Info

June 2020 svwar.py v0.3.3