1SVCRACK.PY(1)                    User Commands                   SVCRACK.PY(1)
2
3
4

NAME

6       svcrack.py - manual page for svcrack.py v0.3.3
7

SYNOPSIS

9       svcrack.py -u username [options] target
10

DESCRIPTION

12       examples:   svcrack.py   -u100  -d  dictionary.txt  udp://10.0.0.1:5080
13       svcrack.py -u100 -r1-9999 -z4 10.0.0.1
14

OPTIONS

16       --version
17              show program's version number and exit
18
19       -h, --help
20              show this help message and exit
21
22       -v, --verbose
23              Increase verbosity
24
25       -q, --quiet
26              Quiet mode
27
28       -p PORT, --port=PORT
29              Destination  port  or  port  ranges  of  the  SIP  device  -  eg
30              -p5060,5061,8000-8100
31
32       -P PORT, --localport=PORT
33              Source port for our packets
34
35       -x IP, --externalip=IP
36              IP  Address  to use as the external ip. Specify this if you have
37              multiple interfaces or if you are behind NAT
38
39       -b BINDINGIP, --bindingip=BINDINGIP
40              By default we bind to all interfaces. This option overrides that
41              and binds to the specified ip address
42
43       -t SELECTTIME, --timeout=SELECTTIME
44              This option allows you to trottle the speed at which packets are
45              sent. Change this if you're losing packets. For example try 0.5.
46
47       -R, --reportback
48              Send the author an exception traceback. Currently sends the com‐
49              mand line parameters and the traceback
50
51       -A, --autogetip
52              Automatically  get  the  current IP address. This is useful when
53              you are not getting any responses back due to SIPVicious not re‐
54              solving your local IP.
55
56       -s NAME, --save=NAME
57              save  the  session.  Has the benefit of allowing you to resume a
58              previous scan and allows you to export scans
59
60       --resume=NAME
61              resume a previous scan
62
63       -c, --enablecompact
64              enable compact mode. Makes packets  smaller  but  possibly  less
65              compatible
66
67       -u USERNAME, --username=USERNAME
68              username to try crack
69
70       -d DICTIONARY, --dictionary=DICTIONARY
71              specify a dictionary file with passwords or - for stdin
72
73       -r RANGE, --range=RANGE
74              specify a range of numbers. example: 100-200,300-310,400
75
76       -e EXTENSION, --extension=EXTENSION
77              Extension to crack. Only specify this when the extension is dif‐
78              ferent from the username.
79
80       -z PADDING, --zeropadding=PADDING
81              the number of zeros used to padd the password.  the options  "-r
82              1-9999 -z 4" would give 0001 0002 0003 ... 9999
83
84       -n, --reusenonce
85              Reuse  nonce.  Some SIP devices don't mind you reusing the nonce
86              (making them vulnerable  to  replay  attacks).   Speeds  up  the
87              cracking.
88
89       -T TEMPLATE, --template=TEMPLATE
90              A  format  string  which allows us to specify a template for the
91              extensions                        example  svwar.py   -e   1-999
92              --template="123%#04i999"   would   scan  between  1230001999  to
93              1230999999"
94
95       --maximumtime=MAXIMUMTIME
96              Maximum  time  in  seconds  to  keep  sending  requests  without
97              receiving a response back
98
99       -D, --enabledefaults
100              Scan  for default / typical passwords such as 1000,2000,3000 ...
101              1100,    etc.    This    option    is    off     by     default.
102              Use --enabledefaults to enable this functionality
103
104       --domain=DOMAIN
105              force  a specific domain name for the SIP message, eg.  -d exam‐
106              ple.org
107
108       --requesturi=REQUESTURI
109              Force the first line URI to a specific value; e.g. sip:999@exam‐
110              ple.org
111
112       -6     Scan an IPv6 address
113
114              SIPvicious  password cracker is an online password guessing tool
115              for SIP devices.
116
117              Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>
118
119              This program is free software: you can  redistribute  it  and/or
120              modify  it  under the terms of the GNU General Public License as
121              published by the Free Software Foundation, either version  3  of
122              the License, or (at your option) any later version.
123
124              This  program is distributed in the hope that it will be useful,
125              but WITHOUT ANY WARRANTY; without even the implied  warranty  of
126              MERCHANTABILITY  or  FITNESS  FOR A PARTICULAR PURPOSE.  See the
127              GNU General Public License for more details.
128
129              You should have received a copy of the GNU  General  Public  Li‐
130              cense    along    with    this    program.     If    not,    see
131              <http://www.gnu.org/licenses/>.
132

SEE ALSO

134       The full documentation  for  svcrack.py  can  be  found  on  GitHub  at
135       <https://github.com/enablesecurity/sipvicious/wiki>.
136
137
138
139svcrack.py v0.3.3                  June 2020                     SVCRACK.PY(1)
Impressum