1SVWAR.PY(1) User Commands SVWAR.PY(1)
2
3
4
6 svwar.py - manual page for svwar.py v0.3.3
7
9 svwar.py [options] target
10
12 examples: svwar.py -e100-999 udp://10.0.0.1:5080 svwar.py -d dictio‐
13 nary.txt 10.0.0.2
14
16 --version
17 show program's version number and exit
18
19 -h, --help
20 show this help message and exit
21
22 -v, --verbose
23 Increase verbosity
24
25 -q, --quiet
26 Quiet mode
27
28 -p PORT, --port=PORT
29 Destination port or port ranges of the SIP device - eg
30 -p5060,5061,8000-8100
31
32 -P PORT, --localport=PORT
33 Source port for our packets
34
35 -x IP, --externalip=IP
36 IP Address to use as the external ip. Specify this if you have
37 multiple interfaces or if you are behind NAT
38
39 -b BINDINGIP, --bindingip=BINDINGIP
40 By default we bind to all interfaces. This option overrides that
41 and binds to the specified ip address
42
43 -t SELECTTIME, --timeout=SELECTTIME
44 This option allows you to trottle the speed at which packets are
45 sent. Change this if you're losing packets. For example try 0.5.
46
47 -R, --reportback
48 Send the author an exception traceback. Currently sends the com‐
49 mand line parameters and the traceback
50
51 -A, --autogetip
52 Automatically get the current IP address. This is useful when
53 you are not getting any responses back due to SIPVicious not re‐
54 solving your local IP.
55
56 -s NAME, --save=NAME
57 save the session. Has the benefit of allowing you to resume a
58 previous scan and allows you to export scans
59
60 --resume=NAME
61 resume a previous scan
62
63 -c, --enablecompact
64 enable compact mode. Makes packets smaller but possibly less
65 compatible
66
67 -d DICTIONARY, --dictionary=DICTIONARY
68 specify a dictionary file with possible extension names or - for
69 stdin
70
71 -m OPTIONS, --method=OPTIONS
72 specify a request method. The default is REGISTER. Other possi‐
73 ble methods are OPTIONS and INVITE
74
75 -e RANGE, --extensions=RANGE
76 specify an extension or extension range example: -e
77 100-999,1000-1500,9999
78
79 -z PADDING, --zeropadding=PADDING
80 the number of zeros used to padd the username. the options "-e
81 1-9999 -z 4" would give 0001 0002 0003 ... 9999
82
83 --force
84 Force scan, ignoring initial sanity checks.
85
86 -T TEMPLATE, --template=TEMPLATE
87 A format string which allows us to specify a template for the
88 extensions example svwar.py -e 1-999
89 --template="123%#04i999" would scan between 1230001999 to
90 1230999999"
91
92 -D, --enabledefaults
93 Scan for default / typical extensions such as 1000,2000,3000 ...
94 1100, etc. This option is off by default.
95 Use --enabledefaults to enable this functionality
96
97 --maximumtime=MAXIMUMTIME
98 Maximum time in seconds to keep sending requests without
99 receiving a response back
100
101 --domain=DOMAIN
102 force a specific domain name for the SIP message, eg. -d exam‐
103 ple.org
104
105 --debug
106 Print SIP messages received
107
108 -6 Scan an IPv6 address
109
110 Sipvicious extension line scanner scans SIP PaBXs for valid ex‐
111 tension lines.
112
113 Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>
114
115 This program is free software: you can redistribute it and/or
116 modify it under the terms of the GNU General Public License as
117 published by the Free Software Foundation, either version 3 of
118 the License, or (at your option) any later version.
119
120 This program is distributed in the hope that it will be useful,
121 but WITHOUT ANY WARRANTY; without even the implied warranty of
122 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
123 GNU General Public License for more details.
124
125 You should have received a copy of the GNU General Public Li‐
126 cense along with this program. If not, see
127 <http://www.gnu.org/licenses/>.
128
130 The full documentation for svwar.py can be found on GitHub at
131 <https://github.com/enablesecurity/sipvicious/wiki>.
132
133
134
135svwar.py v0.3.3 June 2020 SVWAR.PY(1)