1SVMAP.PY(1) User Commands SVMAP.PY(1)
2
3
4
6 svmap.py - manual page for svmap.py v0.3.3
7
9 svmap.py [options] host1 host2 hostrange
10
12 Scans for SIP devices on a given network
13
14 examples:
15
16 svmap.py 10.0.0.1-10.0.0.255 172.16.131.1 sipvicious.org/22
17 10.0.1.1/241.1.1.1-20 1.1.2-20.* 4.1.*.*
18
19 svmap.py -s session1 --randomize 10.0.0.1/8
20
21 svmap.py --resume session1 -v
22
23 svmap.py -p5060-5062 10.0.0.3-20 -m INVITE
24
26 --version
27 show program's version number and exit
28
29 -h, --help
30 show this help message and exit
31
32 -v, --verbose
33 Increase verbosity
34
35 -q, --quiet
36 Quiet mode
37
38 -p PORT, --port=PORT
39 Destination port or port ranges of the SIP device - eg
40 -p5060,5061,8000-8100
41
42 -P PORT, --localport=PORT
43 Source port for our packets
44
45 -x IP, --externalip=IP
46 IP Address to use as the external ip. Specify this if you have
47 multiple interfaces or if you are behind NAT
48
49 -b BINDINGIP, --bindingip=BINDINGIP
50 By default we bind to all interfaces. This option overrides that
51 and binds to the specified ip address
52
53 -t SELECTTIME, --timeout=SELECTTIME
54 This option allows you to trottle the speed at which packets are
55 sent. Change this if you're losing packets. For example try 0.5.
56
57 -R, --reportback
58 Send the author an exception traceback. Currently sends the com‐
59 mand line parameters and the traceback
60
61 -A, --autogetip
62 Automatically get the current IP address. This is useful when
63 you are not getting any responses back due to SIPVicious not re‐
64 solving your local IP.
65
66 -s NAME, --save=NAME
67 save the session. Has the benefit of allowing you to resume a
68 previous scan and allows you to export scans
69
70 --resume=NAME
71 resume a previous scan
72
73 -c, --enablecompact
74 enable compact mode. Makes packets smaller but possibly less
75 compatible
76
77 --randomscan
78 Scan random IP addresses
79
80 -i scan1, --input=scan1
81 Scan IPs which were found in a previous scan. Pass the session
82 name as the argument
83
84 -I scan1, --inputtext=scan1
85 Scan IPs from a text file - use the same syntax as command line
86 but with new lines instead of commas. Pass the file name as the
87 argument
88
89 -m METHOD, --method=METHOD
90 Specify the request method - by default this is OPTIONS.
91
92 -d, --debug
93 Print SIP messages received
94
95 --first=FIRST
96 Only send the first given number of messages (i.e. usually used
97 to scan only X IPs)
98
99 -e EXTENSION, --extension=EXTENSION
100 Specify an extension - by default this is not set
101
102 --randomize
103 Randomize scanning instead of scanning consecutive ip addresses
104
105 --srv Scan the SRV records for SIP on the destination domain name.The
106 targets have to be domain names - example.org domain1.com
107
108 --fromname=FROMNAME
109 Specify a name for the from header in requests
110
111 -6, --ipv6
112 Scan an IPv6 address
113
114 SIPvicious SIP scanner searches for SIP devices on a given net‐
115 work.
116
117 Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>
118
119 This program is free software: you can redistribute it and/or
120 modify it under the terms of the GNU General Public License as
121 published by the Free Software Foundation, either version 3 of
122 the License, or (at your option) any later version.
123
124 This program is distributed in the hope that it will be useful,
125 but WITHOUT ANY WARRANTY; without even the implied warranty of
126 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
127 GNU General Public License for more details.
128
129 You should have received a copy of the GNU General Public Li‐
130 cense along with this program. If not, see
131 <http://www.gnu.org/licenses/>.
132
134 The full documentation for svmap.py can be found on GitHub at
135 <https://github.com/enablesecurity/sipvicious/wiki>.
136
137
138
139svmap.py v0.3.3 June 2020 SVMAP.PY(1)