1SVMAP.PY(1) User Commands SVMAP.PY(1)
2
3
4
6 svmap.py - manual page for svmap.py v0.2.8
7
9 svmap.py [options] host1 host2 hostrange
10
12 Scans for SIP devices on a given network
13
14 examples:
15
16 svmap.py 10.0.0.1-10.0.0.255 172.16.131.1 sipvicious.org/22
17 10.0.1.1/241.1.1.1-20 1.1.2-20.* 4.1.*.*
18
19 svmap.py -s session1 --randomize 10.0.0.1/8
20
21 svmap.py --resume session1 -v
22
23 svmap.py -p5060-5062 10.0.0.3-20 -m INVITE
24
26 --version
27 show program's version number and exit
28
29 -h, --help
30 show this help message and exit
31
32 -v, --verbose
33 Increase verbosity
34
35 -q, --quiet
36 Quiet mode
37
38 -p PORT, --port=PORT
39 Destination port or port ranges of the SIP device - eg
40 -p5060,5061,8000-8100
41
42 -P PORT, --localport=PORT
43 Source port for our packets
44
45 -x IP, --externalip=IP
46 IP Address to use as the external ip. Specify this if you have
47 multiple interfaces or if you are behind NAT
48
49 -b BINDINGIP, --bindingip=BINDINGIP
50 By default we bind to all interfaces. This option overrides that
51 and binds to the specified ip address
52
53 -t SELECTTIME, --timeout=SELECTTIME
54 This option allows you to trottle the speed at which packets are
55 sent. Change this if you're losing packets. For example try 0.5.
56
57 -R, --reportback
58 Send the author an exception traceback. Currently sends the com‐
59 mand line parameters and the traceback
60
61 -A, --autogetip
62 Automatically get the current IP address. This is useful when
63 you are not getting any responses back due to SIPVicious not
64 resolving your local IP.
65
66 -s NAME, --save=NAME
67 save the session. Has the benefit of allowing you to resume a
68 previous scan and allows you to export scans
69
70 --resume=NAME
71 resume a previous scan
72
73 -c, --enablecompact
74 enable compact mode. Makes packets smaller but possibly less
75 compatible
76
77 --randomscan
78 Scan random IP addresses
79
80 -i scan1, --input=scan1
81 Scan IPs which were found in a previous scan. Pass the session
82 name as the argument
83
84 -I scan1, --inputtext=scan1
85 Scan IPs from a text file - use the same syntax as command line
86 but with new lines instead of commas. Pass the file name as the
87 argument
88
89 -m METHOD, --method=METHOD
90 Specify the request method - by default this is OPTIONS.
91
92 -d, --debug
93 Print SIP messages received
94
95 --first=FIRST
96 Only send the first given number of messages (i.e. usually used
97 to scan only X IPs)
98
99 -e EXTENSION, --extension=EXTENSION
100 Specify an extension - by default this is not set
101
102 --randomize
103 Randomize scanning instead of scanning consecutive ip addresses
104
105 --srv Scan the SRV records for SIP on the destination domain name.The
106 targets have to be domain names - example.org domain1.com
107
108 --fromname=FROMNAME
109 specify a name for the from header
110
111 SIPvicious SIP scanner searches for SIP devices on a given net‐
112 work Copyright (C) 2012 Sandro Gauci <sandro@enablesecu‐
113 rity.com>
114
115 This program is free software: you can redistribute it and/or
116 modify it under the terms of the GNU General Public License as
117 published by the Free Software Foundation, either version 3 of
118 the License, or (at your option) any later version.
119
120 This program is distributed in the hope that it will be useful,
121 but WITHOUT ANY WARRANTY; without even the implied warranty of
122 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
123 GNU General Public License for more details.
124
125 You should have received a copy of the GNU General Public
126 License along with this program. If not, see
127 <http://www.gnu.org/licenses/>.
128
130 The full documentation for svmap.py is maintained as a Texinfo manual.
131 If the info and svmap.py programs are properly installed at your site,
132 the command
133
134 info svmap.py
135
136 should give you access to the complete manual.
137
138
139
140svmap.py v0.2.8 November 2012 SVMAP.PY(1)