Provided by: sipvicious_0.3.3-2_all bug

NAME

       svwar.py - extension line scanner

SYNOPSIS

       svwar.py [options] target

DESCRIPTION

       examples: svwar.py -e100-999 udp://10.0.0.1:5080 svwar.py -d dictionary.txt 10.0.0.2

OPTIONS

       --version
              show program's version number and exit

       -h, --help
              show this help message and exit

       -v, --verbose
              Increase verbosity

       -q, --quiet
              Quiet mode

       -p PORT, --port=PORT
              Destination port or port ranges of the SIP device - eg -p5060,5061,8000-8100

       -P PORT, --localport=PORT
              Source port for our packets

       -x IP, --externalip=IP
              IP  Address  to use as the external ip. Specify this if you have multiple interfaces or if you are
              behind NAT

       -b BINDINGIP, --bindingip=BINDINGIP
              By default we bind to all interfaces. This option overrides that and binds  to  the  specified  ip
              address

       -t SELECTTIME, --timeout=SELECTTIME
              This  option  allows  you  to  trottle  the speed at which packets are sent. Change this if you're
              losing packets. For example try 0.5.

       -R, --reportback
              Send the author an exception traceback. Currently  sends  the  command  line  parameters  and  the
              traceback

       -A, --autogetip
              Automatically  get  the  current IP address. This is useful when you are not getting any responses
              back due to SIPVicious not resolving your local IP.

       -s NAME, --save=NAME
              save the session. Has the benefit of allowing you to resume a previous  scan  and  allows  you  to
              export scans

       --resume=NAME
              resume a previous scan

       -c, --enablecompact
              enable compact mode. Makes packets smaller but possibly less compatible

       -d DICTIONARY, --dictionary=DICTIONARY
              specify a dictionary file with possible extension names or - for stdin

       -m OPTIONS, --method=OPTIONS
              specify a request method. The default is REGISTER.  Other possible methods are OPTIONS and INVITE

       -e RANGE, --extensions=RANGE
              specify an extension or extension range  example: -e 100-999,1000-1500,9999

       -z PADDING, --zeropadding=PADDING
              the  number of zeros used to padd the username.  the options "-e 1-9999 -z 4" would give 0001 0002
              0003 ... 9999

       --force
              Force scan, ignoring initial sanity checks.

       -T TEMPLATE, --template=TEMPLATE
              A   format   string   which   allows   us   to   specify   a   template   for    the    extensions
              example svwar.py -e 1-999 --template="123%#04i999" would scan between 1230001999 to 1230999999"

       -D, --enabledefaults
              Scan  for default / typical extensions such as 1000,2000,3000 ... 1100, etc. This option is off by
              default.                       Use --enabledefaults to enable this functionality

       --maximumtime=MAXIMUMTIME
              Maximum time in  seconds  to  keep  sending  requests  without                        receiving  a
              response back

       --domain=DOMAIN
              force a specific domain name for the SIP message, eg.  -d example.org

       --debug
              Print SIP messages received

       -6     Scan an IPv6 address

              Sipvicious extension line scanner scans SIP PaBXs for valid extension lines.

              Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>

              This program is free software: you can redistribute it and/or modify it under the terms of the GNU
              General  Public  License  as  published  by  the Free Software Foundation, either version 3 of the
              License, or (at your option) any later version.

              This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;  without
              even  the  implied  warranty  of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
              General Public License for more details.

              You should have received a copy of the GNU General Public License along  with  this  program.   If
              not, see <http://www.gnu.org/licenses/>.

SEE ALSO

       The      full      documentation      for      svwar.py     can     be     found     on     GitHub     at
       <https://github.com/enablesecurity/sipvicious/wiki>.

svwar.py v0.3.3                                     June 2020                                           SVWAR(1)