SkillAgentSearch skills...

Sipvicious

SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against PBX systems especially through identification, scanning, extension enumeration and password cracking.

Install / Use

/learn @EnableSecurity/Sipvicious

README

Welcome to SIPVicious OSS security tools

SIPVicious mascot

SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.

To get started read the following:

For usage help make use of -h or --help switch.

A note to vendors and service providers

If you are looking for professional VoIP and WebRTC penetration testing services, please check out our offerings at Enable Security.

The tools

The SIPVicious OSS toolset consists of the following tools:

  • svmap
  • svwar
  • svcrack
  • svreport
  • svcrash

svmap

this is a sip scanner. When launched against
ranges of ip address space, it will identify any SIP servers 
which it finds on the way. Also has the option to scan hosts 
on ranges of ports.

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage>

svwar

identifies working extension lines on a PBX. A working 
extension is one that can be registered. 
Also tells you if the extension line requires authentication or not. 

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage>

svcrack

a password cracker making use of digest authentication. 
It is able to crack passwords on both registrar servers and proxy 
servers. Current cracking modes are either numeric ranges or
words from dictionary files.

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage>

IPv6 target syntax

  • svwar and svcrack accept -6 with either a bare IPv6 literal such as 2001:db8::10 or a URI such as udp://[2001:db8::10]:5060.
  • svmap accepts -6 with bare or bracketed IPv6 literals such as 2001:db8::10 or [2001:db8::10].
  • svmap does not accept URI syntax for IPv6 targets. Use -p to choose the destination port, for example sipvicious_svmap -6 -p 5060 [2001:db8::10].

svreport

able to manage sessions created by the rest of the tools
and export to pdf, xml, csv and plain text.

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage>

svcrash

responds to svwar and svcrack SIP messages with a message that
causes old versions to crash. 

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ>

Installation

Please refer to the installation documentation.

Further information

Check out the wiki for documentation.

Related Skills

View on GitHub
GitHub Stars1.1k
CategoryDevelopment
Updated17h ago
Forks179

Languages

Python

Security Score

85/100

Audited on Mar 24, 2026

No findings