.TH SVMAP "1" "June 2020" "svmap.py v0.3.3" "User Commands" .SH NAME svmap.py \- scanner that searches for SIP devices on a given network .SH SYNOPSIS .B svmap.py [\fIoptions\fR] \fIhost1 host2 hostrange\fR .SH DESCRIPTION Scans for SIP devices on a given network .PP examples: .PP svmap.py 10.0.0.1\-10.0.0.255 172.16.131.1 sipvicious.org/22 10.0.1.1/241.1.1.1\-20 1.1.2\-20.* 4.1.*.* .PP svmap.py \fB\-s\fR session1 \fB\-\-randomize\fR 10.0.0.1/8 .PP svmap.py \fB\-\-resume\fR session1 \fB\-v\fR .PP svmap.py \fB\-p5060\-5062\fR 10.0.0.3\-20 \fB\-m\fR INVITE .PP .SH OPTIONS .TP \fB\-\-version\fR show program's version number and exit .TP \fB\-h\fR, \fB\-\-help\fR show this help message and exit .TP \fB\-v\fR, \fB\-\-verbose\fR Increase verbosity .TP \fB\-q\fR, \fB\-\-quiet\fR Quiet mode .TP \fB\-p\fR PORT, \fB\-\-port\fR=\fIPORT\fR Destination port or port ranges of the SIP device \- eg \fB\-p5060\fR,5061,8000\-8100 .TP \fB\-P\fR PORT, \fB\-\-localport\fR=\fIPORT\fR Source port for our packets .TP \fB\-x\fR IP, \fB\-\-externalip\fR=\fIIP\fR IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT .TP \fB\-b\fR BINDINGIP, \fB\-\-bindingip\fR=\fIBINDINGIP\fR By default we bind to all interfaces. This option overrides that and binds to the specified ip address .TP \fB\-t\fR SELECTTIME, \fB\-\-timeout\fR=\fISELECTTIME\fR This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5. .TP \fB\-R\fR, \fB\-\-reportback\fR Send the author an exception traceback. Currently sends the command line parameters and the traceback .TP \fB\-A\fR, \fB\-\-autogetip\fR Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP. .TP \fB\-s\fR NAME, \fB\-\-save\fR=\fINAME\fR save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans .TP \fB\-\-resume\fR=\fINAME\fR resume a previous scan .TP \fB\-c\fR, \fB\-\-enablecompact\fR enable compact mode. Makes packets smaller but possibly less compatible .TP \fB\-\-randomscan\fR Scan random IP addresses .TP \fB\-i\fR scan1, \fB\-\-input\fR=\fIscan1\fR Scan IPs which were found in a previous scan. Pass the session name as the argument .TP \fB\-I\fR scan1, \fB\-\-inputtext\fR=\fIscan1\fR Scan IPs from a text file \- use the same syntax as command line but with new lines instead of commas. Pass the file name as the argument .TP \fB\-m\fR METHOD, \fB\-\-method\fR=\fIMETHOD\fR Specify the request method \- by default this is OPTIONS. .TP \fB\-d\fR, \fB\-\-debug\fR Print SIP messages received .TP \fB\-\-first\fR=\fIFIRST\fR Only send the first given number of messages (i.e. usually used to scan only X IPs) .TP \fB\-e\fR EXTENSION, \fB\-\-extension\fR=\fIEXTENSION\fR Specify an extension \- by default this is not set .TP \fB\-\-randomize\fR Randomize scanning instead of scanning consecutive ip addresses .TP \fB\-\-srv\fR Scan the SRV records for SIP on the destination domain name.The targets have to be domain names \- example.org domain1.com .TP \fB\-\-fromname\fR=\fIFROMNAME\fR Specify a name for the from header in requests .TP \fB\-6\fR, \fB\-\-ipv6\fR Scan an IPv6 address .IP SIPvicious SIP scanner searches for SIP devices on a given network. Copyright (C) 2021 Sandro Gauci .IP This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. .IP This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. .IP You should have received a copy of the GNU General Public License along with this program. If not, see . .SH "SEE ALSO" The full documentation for .B svmap.py can be found on GitHub at .