SIPPTS


NameSIPPTS JSON
Version 0.1.0 PyPI version JSON
download
home_pagehttps://github.com/jivy26/sippts/
SummaryForked SIPPTS for PyPi Publishing
upload_time2024-03-09 23:42:32
maintainer
docs_urlNone
authorYour Name
requires_python>=3.6
licenseMIT
keywords
VCS
bugtrack_url
requirements netifaces IPy pyshark scapy ArpSpoof websocket-client rel pyradamsa
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ![logo](http://blog.pepelux.org/wp-content/uploads/logo-de-sippts.png)


# What is Sippts? #

Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python and it allows us to check the security of a VoIP server using SIP protocol.

# Is it free? #

Yes. You can freely use, modify and distribute. If modified, please put a reference to this site.

# Can be use sippts for illegal purposes? #

Most security tools can be used for illegal purposes, but the purpose of this tool is to check the security of your own servers and not to use to do bad things. I am not responsible for the misuse of this tool.

# Set of tools for penetration test over SIP protocol #

Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Perl script and the tools are:
  * _**Sipscan**_ is a fast scanner for SIP services that uses multithread. Sipscan can check several IPs and port ranges and it can work over UDP or TCP.

[Click here to read more about SIPscan](https://github.com/Pepelux/sippts/wiki/SIPscan)

  * _**Sipexten**_ identifies extensions on a SIP server. Also tells you if the extension line requires authentication or not. Sipexten can check several IPs and port ranges.

[Click here to read more about SIPexten](https://github.com/Pepelux/sippts/wiki/SIPexten)

  * _**Siprcrack**_ is a remote password cracker. Siprcrack can test passwords for several users in different IPs and port ranges.

[Click here to read more about SIPRcrack](https://github.com/Pepelux/sippts/wiki/SIPRCrack)

  * _**Sipinvite**_ checks if a server allow us to make calls without authentication. If the SIP server has a bad configuration, it will allow us to make calls to external numbers. Also it can allow us to transfer the call to a second external number.

[Click here to read more about SIPinvite](https://github.com/Pepelux/sippts/wiki/SIPinvite)

  * _**SipDigestLeak**_ Exploits the SIP digest leak vulnerability discovered by Sandro Gauci that affects a large number of hardware and software devices.

[Click here to read more about SIPDigestLeak](https://github.com/Pepelux/sippts/wiki/SIPDigestLeak)

  * _**SipFlood**_ Send unlimited messages to the target.

[Click here to read more about SIPFlood](https://github.com/Pepelux/sippts/wiki/SIPFlood)

  * _**SipSend**_ Allow us to send a customized SIP message and analyze the response.

[Click here to read more about SIPSend](https://github.com/Pepelux/sippts/wiki/SIPSend)

  * _**WsSend**_ Allow us to send a customized SIP message over WebSockets and analyze the response.

[Click here to read more about WsSend](https://github.com/Pepelux/sippts/wiki/WsSend)

  * _**SipEnumerate**_ Enumerate available methods of a SIP service/server.

[Click here to read more about SIPEnumerate](https://github.com/Pepelux/sippts/wiki/SIPEnumerate)

  * _**SipPCAPDump**_ Extracts SIP Digest authentications from a PCAP file.

[Click here to read more about SIPPCAPDump](https://github.com/Pepelux/sippts/wiki/SIPDump)

  * _**SipDigestCrack**_ Cracking tool to crack the digest authentications within the SIP protocol.

[Click here to read more about SIPDigestCrack](https://github.com/Pepelux/sippts/wiki/SIPCrack)

  * _**SipTshark**_ Extract data of SIP protocol from a PCAP file.

[Click here to read more about SIPTshark](https://github.com/Pepelux/sippts/wiki/SIPTshark)

  * _**RTPBleed**_ to exploit RTPBleed vulnerability sending data to RTP ports.

[Click here to read more about RTPBleed](https://github.com/Pepelux/sippts/wiki/RTPBleed)

  * _**RTCPBleed**_ to exploit RTPBleed vulnerability sending data to RTCP ports.

[Click here to read more about RTCPBleed](https://github.com/Pepelux/sippts/wiki/RTCPBleed)

  * _**RTPBleedFlood**_ to exploit RTPBleed vulnerability flooding a RTP port with an active dialog.

[Click here to read more about RTPBleedFlood](https://github.com/Pepelux/sippts/wiki/RTPBleedFlood)

* _**RTPBleedInject**_ to exploit RTPBleed vulnerability injecting RTP traffic.

[Click here to read more about RTPBleedInject](https://github.com/Pepelux/sippts/wiki/RTPBleedInject)

## Operating System ##
Sippts has been tested on:
  * Linux
  * MacOS
  * Windows

## Requirements ##
  * Python 3

## Instalation ##
  Installing via git:
  * $ git clone https://github.com/Pepelux/sippts.git
  * $ cd sippts
  * $ pip3 install .

## MacOS ##
  Edit requirements.txt and comment next line before install:

  \# pyradamsa




            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/jivy26/sippts/",
    "name": "SIPPTS",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3.6",
    "maintainer_email": "",
    "keywords": "",
    "author": "Your Name",
    "author_email": "your.email@example.com",
    "download_url": "https://files.pythonhosted.org/packages/9c/ca/8632a4b0f14336c13d14beec3f8c6ef326c16d44b6721cafca88be15e75e/SIPPTS-0.1.0.tar.gz",
    "platform": null,
    "description": "![logo](http://blog.pepelux.org/wp-content/uploads/logo-de-sippts.png)\n\n\n# What is Sippts? #\n\nSippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python and it allows us to check the security of a VoIP server using SIP protocol.\n\n# Is it free? #\n\nYes. You can freely use, modify and distribute. If modified, please put a reference to this site.\n\n# Can be use sippts for illegal purposes? #\n\nMost security tools can be used for illegal purposes, but the purpose of this tool is to check the security of your own servers and not to use to do bad things. I am not responsible for the misuse of this tool.\n\n# Set of tools for penetration test over SIP protocol #\n\nSippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Perl script and the tools are:\n  * _**Sipscan**_ is a fast scanner for SIP services that uses multithread. Sipscan can check several IPs and port ranges and it can work over UDP or TCP.\n\n[Click here to read more about SIPscan](https://github.com/Pepelux/sippts/wiki/SIPscan)\n\n  * _**Sipexten**_ identifies extensions on a SIP server. Also tells you if the extension line requires authentication or not. Sipexten can check several IPs and port ranges.\n\n[Click here to read more about SIPexten](https://github.com/Pepelux/sippts/wiki/SIPexten)\n\n  * _**Siprcrack**_ is a remote password cracker. Siprcrack can test passwords for several users in different IPs and port ranges.\n\n[Click here to read more about SIPRcrack](https://github.com/Pepelux/sippts/wiki/SIPRCrack)\n\n  * _**Sipinvite**_ checks if a server allow us to make calls without authentication. If the SIP server has a bad configuration, it will allow us to make calls to external numbers. Also it can allow us to transfer the call to a second external number.\n\n[Click here to read more about SIPinvite](https://github.com/Pepelux/sippts/wiki/SIPinvite)\n\n  * _**SipDigestLeak**_ Exploits the SIP digest leak vulnerability discovered by Sandro Gauci that affects a large number of hardware and software devices.\n\n[Click here to read more about SIPDigestLeak](https://github.com/Pepelux/sippts/wiki/SIPDigestLeak)\n\n  * _**SipFlood**_ Send unlimited messages to the target.\n\n[Click here to read more about SIPFlood](https://github.com/Pepelux/sippts/wiki/SIPFlood)\n\n  * _**SipSend**_ Allow us to send a customized SIP message and analyze the response.\n\n[Click here to read more about SIPSend](https://github.com/Pepelux/sippts/wiki/SIPSend)\n\n  * _**WsSend**_ Allow us to send a customized SIP message over WebSockets and analyze the response.\n\n[Click here to read more about WsSend](https://github.com/Pepelux/sippts/wiki/WsSend)\n\n  * _**SipEnumerate**_ Enumerate available methods of a SIP service/server.\n\n[Click here to read more about SIPEnumerate](https://github.com/Pepelux/sippts/wiki/SIPEnumerate)\n\n  * _**SipPCAPDump**_ Extracts SIP Digest authentications from a PCAP file.\n\n[Click here to read more about SIPPCAPDump](https://github.com/Pepelux/sippts/wiki/SIPDump)\n\n  * _**SipDigestCrack**_ Cracking tool to crack the digest authentications within the SIP protocol.\n\n[Click here to read more about SIPDigestCrack](https://github.com/Pepelux/sippts/wiki/SIPCrack)\n\n  * _**SipTshark**_ Extract data of SIP protocol from a PCAP file.\n\n[Click here to read more about SIPTshark](https://github.com/Pepelux/sippts/wiki/SIPTshark)\n\n  * _**RTPBleed**_ to exploit RTPBleed vulnerability sending data to RTP ports.\n\n[Click here to read more about RTPBleed](https://github.com/Pepelux/sippts/wiki/RTPBleed)\n\n  * _**RTCPBleed**_ to exploit RTPBleed vulnerability sending data to RTCP ports.\n\n[Click here to read more about RTCPBleed](https://github.com/Pepelux/sippts/wiki/RTCPBleed)\n\n  * _**RTPBleedFlood**_ to exploit RTPBleed vulnerability flooding a RTP port with an active dialog.\n\n[Click here to read more about RTPBleedFlood](https://github.com/Pepelux/sippts/wiki/RTPBleedFlood)\n\n* _**RTPBleedInject**_ to exploit RTPBleed vulnerability injecting RTP traffic.\n\n[Click here to read more about RTPBleedInject](https://github.com/Pepelux/sippts/wiki/RTPBleedInject)\n\n## Operating System ##\nSippts has been tested on:\n  * Linux\n  * MacOS\n  * Windows\n\n## Requirements ##\n  * Python 3\n\n## Instalation ##\n  Installing via git:\n  * $ git clone https://github.com/Pepelux/sippts.git\n  * $ cd sippts\n  * $ pip3 install .\n\n## MacOS ##\n  Edit requirements.txt and comment next line before install:\n\n  \\# pyradamsa\n\n\n\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Forked SIPPTS for PyPi Publishing",
    "version": "0.1.0",
    "project_urls": {
        "Homepage": "https://github.com/jivy26/sippts/"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "5ecf56a9250e09bc491b904fe3f8ed90aeccb24ec1ed378a370d5e1c801a3014",
                "md5": "0bcbf1182b518c8409b2aba7df87fc91",
                "sha256": "50eabf9b84dbfdbcbe64cad5c93f0a2f81c59ca8893eaa2dd8172a6c90215717"
            },
            "downloads": -1,
            "filename": "SIPPTS-0.1.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "0bcbf1182b518c8409b2aba7df87fc91",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.6",
            "size": 26779,
            "upload_time": "2024-03-09T23:42:30",
            "upload_time_iso_8601": "2024-03-09T23:42:30.365012Z",
            "url": "https://files.pythonhosted.org/packages/5e/cf/56a9250e09bc491b904fe3f8ed90aeccb24ec1ed378a370d5e1c801a3014/SIPPTS-0.1.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "9cca8632a4b0f14336c13d14beec3f8c6ef326c16d44b6721cafca88be15e75e",
                "md5": "2ae5f84134865ca1d6aa0086a0530715",
                "sha256": "5ccf05298ea872796dc98ac8a5de61c6b317918eec8780ee9d0ac78f355e19bc"
            },
            "downloads": -1,
            "filename": "SIPPTS-0.1.0.tar.gz",
            "has_sig": false,
            "md5_digest": "2ae5f84134865ca1d6aa0086a0530715",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6",
            "size": 19788,
            "upload_time": "2024-03-09T23:42:32",
            "upload_time_iso_8601": "2024-03-09T23:42:32.357983Z",
            "url": "https://files.pythonhosted.org/packages/9c/ca/8632a4b0f14336c13d14beec3f8c6ef326c16d44b6721cafca88be15e75e/SIPPTS-0.1.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-03-09 23:42:32",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "jivy26",
    "github_project": "sippts",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [
        {
            "name": "netifaces",
            "specs": []
        },
        {
            "name": "IPy",
            "specs": []
        },
        {
            "name": "pyshark",
            "specs": []
        },
        {
            "name": "scapy",
            "specs": []
        },
        {
            "name": "ArpSpoof",
            "specs": []
        },
        {
            "name": "websocket-client",
            "specs": []
        },
        {
            "name": "rel",
            "specs": []
        },
        {
            "name": "pyradamsa",
            "specs": []
        }
    ],
    "lcname": "sippts"
}
        
Elapsed time: 0.38754s