140 lines
4.1 KiB
Groff
140 lines
4.1 KiB
Groff
|
.TH SVMAP.PY "1" "June 2020" "svmap.py v0.3.4" "User Commands"
|
||
|
.SH NAME
|
||
|
svmap.py \- manual page for svmap.py v0.3.4
|
||
|
.SH SYNOPSIS
|
||
|
.B svmap.py
|
||
|
[\fIoptions\fR] \fIhost1 host2 hostrange\fR
|
||
|
.SH DESCRIPTION
|
||
|
Scans for SIP devices on a given network
|
||
|
.PP
|
||
|
|
||
|
examples:
|
||
|
.PP
|
||
|
|
||
|
svmap.py 10.0.0.1\-10.0.0.255 172.16.131.1 sipvicious.org/22 10.0.1.1/241.1.1.1\-20 1.1.2\-20.* 4.1.*.*
|
||
|
.PP
|
||
|
|
||
|
svmap.py \fB\-s\fR session1 \fB\-\-randomize\fR 10.0.0.1/8
|
||
|
.PP
|
||
|
|
||
|
svmap.py \fB\-\-resume\fR session1 \fB\-v\fR
|
||
|
.PP
|
||
|
|
||
|
svmap.py \fB\-p5060\-5062\fR 10.0.0.3\-20 \fB\-m\fR INVITE
|
||
|
.PP
|
||
|
|
||
|
.SH OPTIONS
|
||
|
.TP
|
||
|
\fB\-\-version\fR
|
||
|
show program's version number and exit
|
||
|
.TP
|
||
|
\fB\-h\fR, \fB\-\-help\fR
|
||
|
show this help message and exit
|
||
|
.TP
|
||
|
\fB\-v\fR, \fB\-\-verbose\fR
|
||
|
Increase verbosity
|
||
|
.TP
|
||
|
\fB\-q\fR, \fB\-\-quiet\fR
|
||
|
Quiet mode
|
||
|
.TP
|
||
|
\fB\-p\fR PORT, \fB\-\-port\fR=\fIPORT\fR
|
||
|
Destination port or port ranges of the SIP device \- eg
|
||
|
\fB\-p5060\fR,5061,8000\-8100
|
||
|
.TP
|
||
|
\fB\-P\fR PORT, \fB\-\-localport\fR=\fIPORT\fR
|
||
|
Source port for our packets
|
||
|
.TP
|
||
|
\fB\-x\fR IP, \fB\-\-externalip\fR=\fIIP\fR
|
||
|
IP Address to use as the external ip. Specify this if
|
||
|
you have multiple interfaces or if you are behind NAT
|
||
|
.TP
|
||
|
\fB\-b\fR BINDINGIP, \fB\-\-bindingip\fR=\fIBINDINGIP\fR
|
||
|
By default we bind to all interfaces. This option
|
||
|
overrides that and binds to the specified ip address
|
||
|
.TP
|
||
|
\fB\-t\fR SELECTTIME, \fB\-\-timeout\fR=\fISELECTTIME\fR
|
||
|
This option allows you to trottle the speed at which
|
||
|
packets are sent. Change this if you're losing
|
||
|
packets. For example try 0.5.
|
||
|
.TP
|
||
|
\fB\-R\fR, \fB\-\-reportback\fR
|
||
|
Send the author an exception traceback. Currently
|
||
|
sends the command line parameters and the traceback
|
||
|
.TP
|
||
|
\fB\-A\fR, \fB\-\-autogetip\fR
|
||
|
Automatically get the current IP address. This is
|
||
|
useful when you are not getting any responses back due
|
||
|
to SIPVicious not resolving your local IP.
|
||
|
.TP
|
||
|
\fB\-s\fR NAME, \fB\-\-save\fR=\fINAME\fR
|
||
|
save the session. Has the benefit of allowing you to
|
||
|
resume a previous scan and allows you to export scans
|
||
|
.TP
|
||
|
\fB\-\-resume\fR=\fINAME\fR
|
||
|
resume a previous scan
|
||
|
.TP
|
||
|
\fB\-c\fR, \fB\-\-enablecompact\fR
|
||
|
enable compact mode. Makes packets smaller but
|
||
|
possibly less compatible
|
||
|
.TP
|
||
|
\fB\-\-randomscan\fR
|
||
|
Scan random IP addresses
|
||
|
.TP
|
||
|
\fB\-i\fR scan1, \fB\-\-input\fR=\fIscan1\fR
|
||
|
Scan IPs which were found in a previous scan. Pass the
|
||
|
session name as the argument
|
||
|
.TP
|
||
|
\fB\-I\fR scan1, \fB\-\-inputtext\fR=\fIscan1\fR
|
||
|
Scan IPs from a text file \- use the same syntax as
|
||
|
command line but with new lines instead of commas.
|
||
|
Pass the file name as the argument
|
||
|
.TP
|
||
|
\fB\-m\fR METHOD, \fB\-\-method\fR=\fIMETHOD\fR
|
||
|
Specify the request method \- by default this is
|
||
|
OPTIONS.
|
||
|
.TP
|
||
|
\fB\-d\fR, \fB\-\-debug\fR
|
||
|
Print SIP messages received
|
||
|
.TP
|
||
|
\fB\-\-first\fR=\fIFIRST\fR
|
||
|
Only send the first given number of messages (i.e.
|
||
|
usually used to scan only X IPs)
|
||
|
.TP
|
||
|
\fB\-e\fR EXTENSION, \fB\-\-extension\fR=\fIEXTENSION\fR
|
||
|
Specify an extension \- by default this is not set
|
||
|
.TP
|
||
|
\fB\-\-randomize\fR
|
||
|
Randomize scanning instead of scanning consecutive ip
|
||
|
addresses
|
||
|
.TP
|
||
|
\fB\-\-srv\fR
|
||
|
Scan the SRV records for SIP on the destination domain
|
||
|
name.The targets have to be domain names \- example.org
|
||
|
domain1.com
|
||
|
.TP
|
||
|
\fB\-\-fromname\fR=\fIFROMNAME\fR
|
||
|
Specify a name for the from header in requests
|
||
|
.TP
|
||
|
\fB\-6\fR, \fB\-\-ipv6\fR
|
||
|
Scan an IPv6 address
|
||
|
.IP
|
||
|
SIPvicious SIP scanner searches for SIP devices on a given network.
|
||
|
|
||
|
Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>
|
||
|
.IP
|
||
|
This program is free software: you can redistribute it and/or modify
|
||
|
it under the terms of the GNU General Public License as published by
|
||
|
the Free Software Foundation, either version 3 of the License, or
|
||
|
(at your option) any later version.
|
||
|
.IP
|
||
|
This program is distributed in the hope that it will be useful,
|
||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
GNU General Public License for more details.
|
||
|
.IP
|
||
|
You should have received a copy of the GNU General Public License
|
||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||
|
.SH "SEE ALSO"
|
||
|
The full documentation for
|
||
|
.B svmap.py
|
||
|
can be found on GitHub at <https://github.com/enablesecurity/sipvicious/wiki>.
|