[Pkg-voip-commits] r9963 - in /sipvicious/trunk/debian: TODO.Debian patches/ patches/manpages.patch sipvicious.manpages svcrack.1 svcrash.1 svlearnfp.1 svmap.1 svreport.1 svwar.1

maniac-guest at alioth.debian.org maniac-guest at alioth.debian.org
Sun Sep 16 16:43:24 UTC 2012


Author: maniac-guest
Date: Sun Sep 16 16:43:24 2012
New Revision: 9963

URL: http://svn.debian.org/wsvn/pkg-voip/?sc=1&rev=9963
Log:
Manpages

Added:
    sipvicious/trunk/debian/patches/
    sipvicious/trunk/debian/patches/manpages.patch
    sipvicious/trunk/debian/sipvicious.manpages
    sipvicious/trunk/debian/svcrack.1
    sipvicious/trunk/debian/svcrash.1
    sipvicious/trunk/debian/svlearnfp.1
    sipvicious/trunk/debian/svmap.1
    sipvicious/trunk/debian/svreport.1
    sipvicious/trunk/debian/svwar.1
Modified:
    sipvicious/trunk/debian/TODO.Debian

Modified: sipvicious/trunk/debian/TODO.Debian
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/TODO.Debian?rev=9963&op=diff
==============================================================================
--- sipvicious/trunk/debian/TODO.Debian (original)
+++ sipvicious/trunk/debian/TODO.Debian Sun Sep 16 16:43:24 2012
@@ -1,1 +1,1 @@
-Manpages for the utilities
+Better manpages for the utilities

Added: sipvicious/trunk/debian/patches/manpages.patch
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/patches/manpages.patch?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/patches/manpages.patch (added)
+++ sipvicious/trunk/debian/patches/manpages.patch Sun Sep 16 16:43:24 2012
@@ -1,0 +1,210 @@
+Subject: generate manpages from optparse options
+Author: Victor Seva <linuxmaniac at torreviejawireless.org>
+
+Code from http://andialbrecht.wordpress.com/2009/03/17/creating-a-man-page-with-distutils-and-optparse/
+
+--- a/svcrack.py
++++ b/svcrack.py
+@@ -322,7 +322,7 @@
+     from sys import exit
+     import logging
+     import pickle
+-    from svhelper import standardoptions, standardscanneroptions
++    from svhelper import standardoptions, standardscanneroptions, ManPageFormatter
+ 
+     usage = "usage: %prog -u username [options] target\r\n"
+     usage += "examples:\r\n"
+@@ -368,6 +368,11 @@
+     exportpath = None
+     logging.basicConfig(level=calcloglevel(options))
+     logging.debug('started logging')
++    if options.manpage:
++        parser.formatter = ManPageFormatter()
++        parser.formatter.set_parser(parser)
++        print parser.format_option_help()
++        exit(0)
+     if options.resume is not None:
+         exportpath = os.path.join('.sipvicious',__prog__,options.resume)
+         if os.path.exists(os.path.join(exportpath,'closed')):
+--- a/svcrash.py
++++ b/svcrash.py
+@@ -50,6 +50,7 @@
+ 
+ 
+ def getArgs():
++    from svhelper import ManPageFormatter
+     parser = optparse.OptionParser(usage="%prog [options]")
+     parser.add_option('--auto',help="Automatically send responses to attacks",
+                       dest="auto",default=False, action="store_true",)
+@@ -62,7 +63,14 @@
+                       )
+     parser.add_option('-b',help="bruteforce the attacker's port", dest="bruteforceport",
+                       default=False, action="store_true")
++    parser.add_option("--manpage", dest="manpage", default=False, action="store_true",
++                      help="Generate manpage from optparse info")
+     (options, args) = parser.parse_args()
++    if options.manpage:
++        parser.formatter = ManPageFormatter()
++        parser.formatter.set_parser(parser)
++        print parser.format_option_help()
++        sys.exit(0)
+     if not (options.auto or options.astlog):
+         if not options.ipaddr:
+             parser.error("When auto or astlog is not specified, you need to pass an IP address")
+--- a/svhelper.py
++++ b/svhelper.py
+@@ -55,6 +55,8 @@
+                   )
+     parser.add_option("-A","--autogetip", dest="autogetip", default=False, action="store_true",
+                       help="Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.")
++    parser.add_option("--manpage", dest="manpage", default=False, action="store_true",
++                      help="Generate manpage from optparse info")
+     return parser
+ 
+ def standardscanneroptions(parser):
+@@ -1052,6 +1054,41 @@
+                         log.debug("%s resolved to %s" % (_tmp.target.to_text(),hostname))
+                         yield(hostname,_tmp.port,method)
+ 
++class ManPageFormatter(optparse.HelpFormatter):
++
++    def __init__(self, indent_increment=2, max_help_position=24,
++	         width=None, short_first=1):
++        """Constructor. Unfortunately HelpFormatter is no new-style class."""
++        optparse.HelpFormatter.__init__(self, indent_increment,
++                                        max_help_position, width, short_first)
++
++    def _markup(self, txt):
++        """Prepares txt to be used in man pages."""
++        return txt.replace('-', '\\-')
++
++    def format_usage(self, usage):
++        """Formate the usage/synopsis line."""
++        return self._markup(usage)
++
++    def format_heading(self, heading):
++        """Format a heading.
++        If level is 0 return an empty string. This usually is the string "Options".
++        """
++        if self.level == 0:
++            return ''
++        return '.TP\n%s\n' % self._markup(heading.upper())
++
++    def format_option(self, option):
++        """Format a single option.
++        The base class takes care to replace custom optparse values.
++        """
++        result = []
++        opts = self.option_strings[option]
++        result.append('.TP\n.B %s\n' % self._markup(opts))
++        if option.help:
++            help_text = '%s\n' % self._markup(self.expand_default(option))
++            result.append(help_text)
++        return ''.join(result)
+ 
+ if __name__ == '__main__':
+     print getranges('1.1.1.1/24')
+@@ -1060,4 +1097,3 @@
+         a = ip4range(seq)
+         for x in iter(a):
+             print x
+-
+--- a/svlearnfp.py
++++ b/svlearnfp.py
+@@ -118,6 +118,7 @@
+     from optparse import OptionParser
+     from svhelper import makeRequest, calcloglevel, fingerPrintPacket, standardoptions, bindto
+     from regen import generateregex
++    from svhelper import ManPageFormatter
+     import logging
+     import sys,re
+     log = logging.getLogger('')
+@@ -134,6 +135,11 @@
+     parser.add_option("--auto", dest="auto", action="store_true", default=False,
+                       help="automatically process and save the fingerprint")
+     (options, args) = parser.parse_args()
++    if options.manpage: 
++        parser.formatter = ManPageFormatter()
++        parser.formatter.set_parser(parser)
++        print parser.format_option_help()
++        sys.exit(0)
+     if not options.force:
+         parser.error("This tool is not supported anymore and is being rewritten. If you really want to use it you need force ;-)")
+         sys.exit()
+--- a/svmap.py
++++ b/svmap.py
+@@ -283,7 +283,7 @@
+     from datetime import datetime
+     import anydbm
+     import os
+-    from svhelper import standardoptions, standardscanneroptions, calcloglevel
++    from svhelper import standardoptions, standardscanneroptions, calcloglevel, ManPageFormatter
+     from sys import exit
+     import logging
+     import pickle
+@@ -334,6 +334,11 @@
+     from svhelper import getRange, scanfromfile, scanlist, scanrandom, getranges,\
+         ip4range, resumeFromIP, scanfromdb, dbexists, getTargetFromSRV
+     exportpath = None
++    if options.manpage is not None: 
++        parser.formatter = ManPageFormatter()
++        parser.formatter.set_parser(parser)
++        print parser.format_option_help()
++        exit(0)
+     if options.resume is not None:
+         exportpath = os.path.join('.sipvicious',__prog__,options.resume)
+         if os.path.exists(os.path.join(exportpath,'closed')):
+--- a/svreport.py
++++ b/svreport.py
+@@ -20,7 +20,7 @@
+    along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ """
+ 
+-from svhelper import __author__, __version__
++from svhelper import __author__, __version__, ManPageFormatter
+ __prog__   = 'svreport'
+ 
+ import anydbm
+@@ -63,7 +63,14 @@
+                           action="store_false", help="Do not resolve the ip address")
+         parser.add_option("-c", "--count", dest="count", default=False,
+                           action="store_true", help="Used togather with 'list' command to count the number of entries")
++        parser.add_option("--manpage", dest="manpage", default=False, action="store_true",
++                          help="Generate manpage from optparse info")
+         (options,args) = parser.parse_args()
++        if options.manpage: 
++            parser.formatter = ManPageFormatter()
++            parser.formatter.set_parser(parser)
++            print parser.format_option_help()
++            exit(0)
+         if len(args) < 1:
+                 parser.error("Please specify a command.\r\n")
+                 exit(1)
+--- a/svwar.py
++++ b/svwar.py
+@@ -409,7 +409,7 @@
+     import pickle
+     from svhelper import resumeFrom, calcloglevel
+     from svhelper import standardoptions, standardscanneroptions
+-    from svhelper import getRange 
++    from svhelper import getRange, ManPageFormatter 
+     
+     usage = "usage: %prog [options] target\r\n"
+     usage += "examples:\r\n"
+@@ -454,11 +454,15 @@
+                   help="Print SIP messages received",
+                   default=False, action="store_true"
+                   )
+-
++    parser.formatter = ManPageFormatter()
++    parser.formatter.set_parser(parser)
+     (options, args) = parser.parse_args()
+     exportpath = None
+     logging.basicConfig(level=calcloglevel(options))
+     logging.debug('started logging')
++    if options.manpage is not None: 
++        parser.format_option_help()
++        exit(0)
+     if options.force:
+         initialcheck = False
+     else:

Added: sipvicious/trunk/debian/sipvicious.manpages
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/sipvicious.manpages?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/sipvicious.manpages (added)
+++ sipvicious/trunk/debian/sipvicious.manpages Sun Sep 16 16:43:24 2012
@@ -1,0 +1,6 @@
+debian/svcrack.1
+debian/svcrash.1
+debian/svlearnfp.1
+debian/svmap.1
+debian/svreport.1
+debian/svwar.1

Added: sipvicious/trunk/debian/svcrack.1
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/svcrack.1?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/svcrack.1 (added)
+++ sipvicious/trunk/debian/svcrack.1 Sun Sep 16 16:43:24 2012
@@ -1,0 +1,89 @@
+.TH svcrack 1 "16 Sept 2012" ".1" "Sipvicious"
+.SH NAME
+svcrack \- Sipvicious tools
+.SH DESCRIPTION
+A password cracker making use of digest authentication. 
+It is able to crack passwords on both registrar servers and proxy 
+servers. Current cracking modes are either numeric ranges or
+words from dictionary files.
+.SH OPTIONS
+.TP
+.B \-\-version
+show program's version number and exit
+.TP
+.B \-h, \-\-help
+show this help message and exit
+.TP
+.B \-v, \-\-verbose
+Increase verbosity
+.TP
+.B \-q, \-\-quiet
+Quiet mode
+.TP
+.B \-p PORT, \-\-port=PORT
+Destination port or port ranges of the SIP device \- eg \-p5060,5061,8000\-8100
+.TP
+.B \-P PORT, \-\-localport=PORT
+Source port for our packets
+.TP
+.B \-x IP, \-\-externalip=IP
+IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT
+.TP
+.B \-b BINDINGIP, \-\-bindingip=BINDINGIP
+By default we bind to all interfaces. This option overrides that and binds to the specified ip address
+.TP
+.B \-t SELECTTIME, \-\-timeout=SELECTTIME
+This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.
+.TP
+.B \-R, \-\-reportback
+Send the author an exception traceback. Currently sends the command line parameters and the traceback
+.TP
+.B \-A, \-\-autogetip
+Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.
+.TP
+.B \-s NAME, \-\-save=NAME
+save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans
+.TP
+.B \-\-resume=NAME
+resume a previous scan
+.TP
+.B \-c, \-\-enablecompact
+enable compact mode. Makes packets smaller but possibly less compatible
+.TP
+.B \-u USERNAME, \-\-username=USERNAME
+username to try crack
+.TP
+.B \-d DICTIONARY, \-\-dictionary=DICTIONARY
+specify a dictionary file with passwords
+.TP
+.B \-r RANGE, \-\-range=RANGE
+specify a range of numbers. example: 100\-200,300\-310,400
+.TP
+.B \-e EXTENSION, \-\-extension=EXTENSION
+Extension to crack. Only specify this when the extension is different from the username.
+.TP
+.B \-z PADDING, \-\-zeropadding=PADDING
+the number of zeros used to padd the password.
+                  the options "\-r 1\-9999 \-z 4" would give 0001 0002 0003 ... 9999
+.TP
+.B \-n, \-\-reusenonce
+Reuse nonce. Some SIP devices don't mind you reusing the nonce (making them vulnerable to replay attacks). Speeds up the cracking.
+.TP
+.B \-T TEMPLATE, \-\-template=TEMPLATE
+A format string which allows us to specify a template for the extensions
+                      example svwar.py \-e 1\-999 \-\-template="123%#04i999" would scan between 1230001999 to 1230999999"
+                      
+.TP
+.B \-\-maximumtime=MAXIMUMTIME
+Maximum time in seconds to keep sending requests without
+                      receiving a response back
+.TP
+.B \-D, \-\-enabledefaults
+Scan for default / typical passwords such as
+                      1000,2000,3000 ... 1100, etc. This option is off by default.
+                      Use \-\-enabledefaults to enable this functionality
+.TP
+.B \-\-domain=DOMAIN
+force a specific domain name for the SIP message, eg. \-d example.org
+.SH AUTHOR
+This minimal man page was written by Victor Seva <linuxmaniac at torreviejawireless.org>.

Added: sipvicious/trunk/debian/svcrash.1
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/svcrash.1?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/svcrash.1 (added)
+++ sipvicious/trunk/debian/svcrash.1 Sun Sep 16 16:43:24 2012
@@ -1,0 +1,27 @@
+.TH svcrash 1 "16 Sept 2012" ".1" "Sipvicious"
+.SH NAME
+svcrash \- Sipvicious tools
+.SH DESCRIPTION
+responds to svwar and svcrack SIP messages with a message that
+causes old versions to crash. 
+.SH OPTIONS
+.TP
+.B \-h, \-\-help
+show this help message and exit
+.TP
+.B \-\-auto
+Automatically send responses to attacks
+.TP
+.B \-\-astlog=ASTLOG
+Path for the asterisk full logfile
+.TP
+.B \-d IPADDR
+specify attacker's ip address
+.TP
+.B \-p PORT
+specify attacker's port
+.TP
+.B \-b
+bruteforce the attacker's port
+.SH AUTHOR
+This minimal man page was written by Victor Seva <linuxmaniac at torreviejawireless.org>.

Added: sipvicious/trunk/debian/svlearnfp.1
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/svlearnfp.1?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/svlearnfp.1 (added)
+++ sipvicious/trunk/debian/svlearnfp.1 Sun Sep 16 16:43:24 2012
@@ -1,0 +1,56 @@
+.TH svlearnfp 1 "16 Sept 2012" ".1" "Sipvicious"
+.SH NAME
+svlearnfp \- Sipvicious tools
+.SH DESCRIPTION
+Allows you to generate new fingerprints by simply running 
+the tool against a host. It will attempt to guess most values and allow 
+you to save the information to the local fingerprint db. Then you can 
+choose to upload it to the author so that it can be added to the database.
+.SH OPTIONS
+.TP
+.B \-h, \-\-help
+show this help message and exit
+.TP
+.B \-v, \-\-verbose
+Increase verbosity
+.TP
+.B \-q, \-\-quiet
+Quiet mode
+.TP
+.B \-p PORT, \-\-port=PORT
+Destination port or port ranges of the SIP device \- eg \-p5060,5061,8000\-8100
+.TP
+.B \-P PORT, \-\-localport=PORT
+Source port for our packets
+.TP
+.B \-x IP, \-\-externalip=IP
+IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT
+.TP
+.B \-b BINDINGIP, \-\-bindingip=BINDINGIP
+By default we bind to all interfaces. This option overrides that and binds to the specified ip address
+.TP
+.B \-t SELECTTIME, \-\-timeout=SELECTTIME
+This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.
+.TP
+.B \-R, \-\-reportback
+Send the author an exception traceback. Currently sends the command line parameters and the traceback
+.TP
+.B \-A, \-\-autogetip
+Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.
+.TP
+.B \-\-manpage
+Generate manpage from optparse info
+.TP
+.B \-\-force
+This tool is not supported anymore and is being rewritten. If you really want to use it you need force ;\-)
+.TP
+.B \-S SAMPLES, \-\-samples=SAMPLES
+Number of samples to take
+.TP
+.B \-\-customregex
+Specify a regular expression and override the automatically generated one. Do not use unless you know what you're doing
+.TP
+.B \-\-auto
+automatically process and save the fingerprint
+.SH AUTHOR
+This minimal man page was written by Victor Seva <linuxmaniac at torreviejawireless.org>.

Added: sipvicious/trunk/debian/svmap.1
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/svmap.1?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/svmap.1 (added)
+++ sipvicious/trunk/debian/svmap.1 Sun Sep 16 16:43:24 2012
@@ -1,0 +1,86 @@
+.TH svmap 1 "16 Sept 2012" ".1" "Sipvicious"
+.SH NAME
+svmap \- Sipvicious tools
+.SH DESCRIPTION
+This is a sip scanner. When launched against
+ranges of ip address space, it will identify any SIP servers 
+which it finds on the way. Also has the option to scan hosts 
+on ranges of ports.
+.SH OPTIONS
+.TP
+.B \-\-version
+show program's version number and exit
+.TP
+.B \-h, \-\-help
+show this help message and exit
+.TP
+.B \-v, \-\-verbose
+Increase verbosity
+.TP
+.B \-q, \-\-quiet
+Quiet mode
+.TP
+.B \-p PORT, \-\-port=PORT
+Destination port or port ranges of the SIP device \- eg \-p5060,5061,8000\-8100
+.TP
+.B \-P PORT, \-\-localport=PORT
+Source port for our packets
+.TP
+.B \-x IP, \-\-externalip=IP
+IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT
+.TP
+.B \-b BINDINGIP, \-\-bindingip=BINDINGIP
+By default we bind to all interfaces. This option overrides that and binds to the specified ip address
+.TP
+.B \-t SELECTTIME, \-\-timeout=SELECTTIME
+This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.
+.TP
+.B \-R, \-\-reportback
+Send the author an exception traceback. Currently sends the command line parameters and the traceback
+.TP
+.B \-A, \-\-autogetip
+Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.
+.TP
+.B \-s NAME, \-\-save=NAME
+save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans
+.TP
+.B \-\-resume=NAME
+resume a previous scan
+.TP
+.B \-c, \-\-enablecompact
+enable compact mode. Makes packets smaller but possibly less compatible
+.TP
+.B \-\-randomscan
+Scan random IP addresses
+.TP
+.B \-i scan1, \-\-input=scan1
+Scan IPs which were found in a previous scan. Pass the session name as the argument
+.TP
+.B \-I scan1, \-\-inputtext=scan1
+Scan IPs from a text file \- use the same syntax as command line but with new lines instead of commas. Pass the file name as the argument
+.TP
+.B \-m METHOD, \-\-method=METHOD
+Specify the request method \- by default this is OPTIONS.
+.TP
+.B \-d, \-\-debug
+Print SIP messages received
+.TP
+.B \-\-first=FIRST
+Only send the first given number of messages (i.e. usually used to scan only X IPs)
+.TP
+.B \-e EXTENSION, \-\-extension=EXTENSION
+Specify an extension \- by default this is not set
+.TP
+.B \-\-randomize
+Randomize scanning instead of scanning consecutive ip addresses
+.TP
+.B \-\-srv
+Scan the SRV records for SIP on the destination domain name.The targets have to be domain names \- example.org domain1.com
+.TP
+.B \-\-fromname=FROMNAME
+specify a name for the from header
+.TP
+.B \-\-fingerprint, \-\-fp
+enable fingerprinting (default is off)
+.SH AUTHOR
+This minimal man page was written by Victor Seva <linuxmaniac at torreviejawireless.org>.

Added: sipvicious/trunk/debian/svreport.1
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/svreport.1?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/svreport.1 (added)
+++ sipvicious/trunk/debian/svreport.1 Sun Sep 16 16:43:24 2012
@@ -1,0 +1,36 @@
+.TH svreport 1 "16 Sept 2012" ".1" "Sipvicious"
+.SH NAME
+svreport \- Sipvicious tools
+.SH DESCRIPTION
+Able to manage sessions created by the rest of the tools
+and export to pdf, xml, csv and plain text.
+.SH OPTIONS
+.TP
+.B \-h, \-\-help
+show this help message and exit
+.TP
+.B \-v, \-\-verbose
+Increase verbosity
+.TP
+.B \-q, \-\-quiet
+Quiet mode
+.TP
+.B \-t SESSIONTYPE, \-\-type=SESSIONTYPE
+Type of session. This is usually either svmap, svwar or svcrack. If not set I will try to find the best match
+.TP
+.B \-s SESSION, \-\-session=SESSION
+Name of the session
+.TP
+.B \-f FORMAT, \-\-format=FORMAT
+Format type. Can be stdout, pdf, xml, csv or txt
+.TP
+.B \-o OUTPUTFILE, \-\-output=OUTPUTFILE
+Output filename
+.TP
+.B \-n
+Do not resolve the ip address
+.TP
+.B \-c, \-\-count
+Used togather with 'list' command to count the number of entries
+.SH AUTHOR
+This minimal man page was written by Victor Seva <linuxmaniac at torreviejawireless.org>.

Added: sipvicious/trunk/debian/svwar.1
URL: http://svn.debian.org/wsvn/pkg-voip/sipvicious/trunk/debian/svwar.1?rev=9963&op=file
==============================================================================
--- sipvicious/trunk/debian/svwar.1 (added)
+++ sipvicious/trunk/debian/svwar.1 Sun Sep 16 16:43:24 2012
@@ -1,0 +1,89 @@
+.TH svwar 1 "16 Sept 2012" ".1" "Sipvicious"
+.SH NAME
+svwar \- Sipvicious tools
+.SH DESCRIPTION
+Identifies working extension lines on a PBX. A working
+extension is one that can be registered. 
+Also tells you if the extension line requires authentication or not. 
+.SH OPTIONS
+.TP
+.B \-\-version
+show program's version number and exit
+.TP
+.B \-h, \-\-help
+show this help message and exit
+.TP
+.B \-v, \-\-verbose
+Increase verbosity
+.TP
+.B \-q, \-\-quiet
+Quiet mode
+.TP
+.B \-p PORT, \-\-port=PORT
+Destination port or port ranges of the SIP device \- eg \-p5060,5061,8000\-8100
+.TP
+.B \-P PORT, \-\-localport=PORT
+Source port for our packets
+.TP
+.B \-x IP, \-\-externalip=IP
+IP Address to use as the external ip. Specify this if you have multiple interfaces or if you are behind NAT
+.TP
+.B \-b BINDINGIP, \-\-bindingip=BINDINGIP
+By default we bind to all interfaces. This option overrides that and binds to the specified ip address
+.TP
+.B \-t SELECTTIME, \-\-timeout=SELECTTIME
+This option allows you to trottle the speed at which packets are sent. Change this if you're losing packets. For example try 0.5.
+.TP
+.B \-R, \-\-reportback
+Send the author an exception traceback. Currently sends the command line parameters and the traceback
+.TP
+.B \-A, \-\-autogetip
+Automatically get the current IP address. This is useful when you are not getting any responses back due to SIPVicious not resolving your local IP.
+.TP
+.B \-s NAME, \-\-save=NAME
+save the session. Has the benefit of allowing you to resume a previous scan and allows you to export scans
+.TP
+.B \-\-resume=NAME
+resume a previous scan
+.TP
+.B \-c, \-\-enablecompact
+enable compact mode. Makes packets smaller but possibly less compatible
+.TP
+.B \-d DICTIONARY, \-\-dictionary=DICTIONARY
+specify a dictionary file with possible extension names
+.TP
+.B \-m OPTIONS, \-\-method=OPTIONS
+specify a request method. The default is REGISTER. Other possible methods are OPTIONS and INVITE
+.TP
+.B \-e RANGE, \-\-extensions=RANGE
+specify an extension or extension range
+example: \-e 100\-999,1000\-1500,9999
+.TP
+.B \-z PADDING, \-\-zeropadding=PADDING
+the number of zeros used to padd the username.
+                  the options "\-e 1\-9999 \-z 4" would give 0001 0002 0003 ... 9999
+.TP
+.B \-\-force
+Force scan, ignoring initial sanity checks.
+.TP
+.B \-T TEMPLATE, \-\-template=TEMPLATE
+A format string which allows us to specify a template for the extensions
+                      example svwar.py \-e 1\-999 \-\-template="123%#04i999" would scan between 1230001999 to 1230999999"
+                      
+.TP
+.B \-D, \-\-enabledefaults
+Scan for default / typical extensions such as
+                      1000,2000,3000 ... 1100, etc. This option is off by default.
+                      Use \-\-enabledefaults to enable this functionality
+.TP
+.B \-\-maximumtime=MAXIMUMTIME
+Maximum time in seconds to keep sending requests without
+                      receiving a response back
+.TP
+.B \-\-domain=DOMAIN
+force a specific domain name for the SIP message, eg. \-d example.org
+.TP
+.B \-\-debug
+Print SIP messages received
+.SH AUTHOR
+This minimal man page was written by Victor Seva <linuxmaniac at torreviejawireless.org>.




More information about the Pkg-voip-commits mailing list