Scroll to navigation

SVWAR(1) User Commands SVWAR(1)

NAME

svwar.py - extension line scanner

SYNOPSIS

svwar.py [options] target

DESCRIPTION

examples: svwar.py -e100-999 udp://10.0.0.1:5080 svwar.py -d dictionary.txt 10.0.0.2

OPTIONS

show program's version number and exit
show this help message and exit
Increase verbosity
Quiet mode
Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100
Source port for our packets
IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT
By default we bind to all interfaces. This option overrides that and binds to the specified ip address
This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.
Send the author an exception traceback. Currently sends the command line parameters and the traceback
Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.
save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans
resume a previous scan
enable compact mode. Makes packets smaller but possibly less compatible
specify a dictionary file with possible extension names or - for stdin
specify a request method. The default is REGISTER. Other possible methods are OPTIONS and INVITE
specify an extension or extension range example: -e 100-999,1000-1500,9999
the number of zeros used to padd the username. the options "-e 1-9999 -z 4" would give 0001 0002 0003 ... 9999
Force scan, ignoring initial sanity checks.
A format string which allows us to specify a template for the extensions example svwar.py -e 1-999 --template="123%#04i999" would scan between 1230001999 to 1230999999"
Scan for default / typical extensions such as 1000,2000,3000 ... 1100, etc. This option is off by default. Use --enabledefaults to enable this functionality
Maximum time in seconds to keep sending requests without receiving a response back
force a specific domain name for the SIP message, eg. -d example.org
Print SIP messages received
-6
Scan an IPv6 address
Sipvicious extension line scanner scans SIP PaBXs for valid extension lines.

Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>.

SEE ALSO

The full documentation for svwar.py can be found on GitHub at <https://github.com/enablesecurity/sipvicious/wiki>.

June 2020 svwar.py v0.3.3