Provided by: sipvicious_0.3.3-2_all bug

NAME

       svmap.py - scanner that searches for SIP devices on a given network

SYNOPSIS

       svmap.py [options] host1 host2 hostrange

DESCRIPTION

       Scans for SIP devices on a given network

       examples:

       svmap.py 10.0.0.1-10.0.0.255 172.16.131.1 sipvicious.org/22 10.0.1.1/241.1.1.1-20 1.1.2-20.* 4.1.*.*

       svmap.py -s session1 --randomize 10.0.0.1/8

       svmap.py --resume session1 -v

       svmap.py -p5060-5062 10.0.0.3-20 -m INVITE

OPTIONS

       --version
              show program's version number and exit

       -h, --help
              show this help message and exit

       -v, --verbose
              Increase verbosity

       -q, --quiet
              Quiet mode

       -p PORT, --port=PORT
              Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100

       -P PORT, --localport=PORT
              Source port for our packets

       -x IP, --externalip=IP
              IP  Address  to use as the external ip. Specify this if you have multiple interfaces or if you are
              behind NAT

       -b BINDINGIP, --bindingip=BINDINGIP
              By default we bind to all interfaces. This option overrides that and binds  to  the  specified  ip
              address

       -t SELECTTIME, --timeout=SELECTTIME
              This  option  allows  you  to  trottle  the speed at which packets are sent. Change this if you're
              losing packets. For example try 0.5.

       -R, --reportback
              Send the author an exception traceback. Currently  sends  the  command  line  parameters  and  the
              traceback

       -A, --autogetip
              Automatically  get  the  current IP address. This is useful when you are not getting any responses
              back due to SIPVicious not resolving your local IP.

       -s NAME, --save=NAME
              save the session. Has the benefit of allowing you to resume a previous  scan  and  allows  you  to
              export scans

       --resume=NAME
              resume a previous scan

       -c, --enablecompact
              enable compact mode. Makes packets smaller but possibly less compatible

       --randomscan
              Scan random IP addresses

       -i scan1, --input=scan1
              Scan IPs which were found in a previous scan. Pass the session name as the argument

       -I scan1, --inputtext=scan1
              Scan  IPs  from  a  text  file - use the same syntax as command line but with new lines instead of
              commas.  Pass the file name as the argument

       -m METHOD, --method=METHOD
              Specify the request method - by default this is OPTIONS.

       -d, --debug
              Print SIP messages received

       --first=FIRST
              Only send the first given number of messages (i.e.  usually used to scan only X IPs)

       -e EXTENSION, --extension=EXTENSION
              Specify an extension - by default this is not set

       --randomize
              Randomize scanning instead of scanning consecutive ip addresses

       --srv  Scan the SRV records for SIP on the destination domain name.The targets have to be domain names  -
              example.org domain1.com

       --fromname=FROMNAME
              Specify a name for the from header in requests

       -6, --ipv6
              Scan an IPv6 address

              SIPvicious SIP scanner searches for SIP devices on a given network.

              Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>

              This program is free software: you can redistribute it and/or modify it under the terms of the GNU
              General  Public  License  as  published  by  the Free Software Foundation, either version 3 of the
              License, or (at your option) any later version.

              This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;  without
              even  the  implied  warranty  of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
              General Public License for more details.

              You should have received a copy of the GNU General Public License along  with  this  program.   If
              not, see <http://www.gnu.org/licenses/>.

SEE ALSO

       The      full      documentation      for      svmap.py     can     be     found     on     GitHub     at
       <https://github.com/enablesecurity/sipvicious/wiki>.

svmap.py v0.3.3                                     June 2020                                           SVMAP(1)