summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-03-09 16:53:32 +0000
committerCoprDistGit <infra@openeuler.org>2023-03-09 16:53:32 +0000
commita66a58a26bb5629eaa04986403aebb522e27f3b2 (patch)
tree1e3f0a3a63798dddcca8d501cde2b842f9fa1f75
parent2f8535bfc442368dfe073f6db3233500ec9dfa5c (diff)
automatic import of python-sipvicious
-rw-r--r--.gitignore1
-rw-r--r--python-sipvicious.spec309
-rw-r--r--sources1
3 files changed, 311 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..f664ab1 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/sipvicious-0.3.4.tar.gz
diff --git a/python-sipvicious.spec b/python-sipvicious.spec
new file mode 100644
index 0000000..afaeaaa
--- /dev/null
+++ b/python-sipvicious.spec
@@ -0,0 +1,309 @@
+%global _empty_manifest_terminate_build 0
+Name: python-sipvicious
+Version: 0.3.4
+Release: 1
+Summary: SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems.
+License: GPL
+URL: https://github.com/EnableSecurity/sipvicious
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/4c/53/b228769dd96ef86e0a557a5957682cd25af7cbc1e2118a7d34cd125b11fd/sipvicious-0.3.4.tar.gz
+BuildArch: noarch
+
+
+%description
+# Welcome to SIPVicious OSS security tools
+
+![SIPVicious mascot](https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa)
+
+SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.
+
+To get started read the following:
+
+- [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started)
+- Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/).
+
+For usage help make use of `-h` or `--help` switch.
+
+## A note to vendors and service providers
+
+If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro).
+
+
+## The tools
+
+The SIPVicious OSS toolset consists of the following tools:
+
+- svmap
+- svwar
+- svcrack
+- svreport
+- svcrash
+
+### svmap
+
+ this is a sip scanner. When launched against
+ ranges of ip address space, it will identify any SIP servers
+ which it finds on the way. Also has the option to scan hosts
+ on ranges of ports.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage>
+
+### svwar
+
+ identifies working extension lines on a PBX. A working
+ extension is one that can be registered.
+ Also tells you if the extension line requires authentication or not.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage>
+
+### svcrack
+
+ a password cracker making use of digest authentication.
+ It is able to crack passwords on both registrar servers and proxy
+ servers. Current cracking modes are either numeric ranges or
+ words from dictionary files.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage>
+
+### svreport
+
+ able to manage sessions created by the rest of the tools
+ and export to pdf, xml, csv and plain text.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage>
+
+### svcrash
+
+ responds to svwar and svcrack SIP messages with a message that
+ causes old versions to crash.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ>
+
+
+## Installation
+
+Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation).
+
+## Further information
+
+Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation.
+
+
+
+
+
+%package -n python3-sipvicious
+Summary: SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems.
+Provides: python-sipvicious
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-sipvicious
+# Welcome to SIPVicious OSS security tools
+
+![SIPVicious mascot](https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa)
+
+SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.
+
+To get started read the following:
+
+- [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started)
+- Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/).
+
+For usage help make use of `-h` or `--help` switch.
+
+## A note to vendors and service providers
+
+If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro).
+
+
+## The tools
+
+The SIPVicious OSS toolset consists of the following tools:
+
+- svmap
+- svwar
+- svcrack
+- svreport
+- svcrash
+
+### svmap
+
+ this is a sip scanner. When launched against
+ ranges of ip address space, it will identify any SIP servers
+ which it finds on the way. Also has the option to scan hosts
+ on ranges of ports.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage>
+
+### svwar
+
+ identifies working extension lines on a PBX. A working
+ extension is one that can be registered.
+ Also tells you if the extension line requires authentication or not.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage>
+
+### svcrack
+
+ a password cracker making use of digest authentication.
+ It is able to crack passwords on both registrar servers and proxy
+ servers. Current cracking modes are either numeric ranges or
+ words from dictionary files.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage>
+
+### svreport
+
+ able to manage sessions created by the rest of the tools
+ and export to pdf, xml, csv and plain text.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage>
+
+### svcrash
+
+ responds to svwar and svcrack SIP messages with a message that
+ causes old versions to crash.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ>
+
+
+## Installation
+
+Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation).
+
+## Further information
+
+Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation.
+
+
+
+
+
+%package help
+Summary: Development documents and examples for sipvicious
+Provides: python3-sipvicious-doc
+%description help
+# Welcome to SIPVicious OSS security tools
+
+![SIPVicious mascot](https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa)
+
+SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.
+
+To get started read the following:
+
+- [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started)
+- Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/).
+
+For usage help make use of `-h` or `--help` switch.
+
+## A note to vendors and service providers
+
+If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro).
+
+
+## The tools
+
+The SIPVicious OSS toolset consists of the following tools:
+
+- svmap
+- svwar
+- svcrack
+- svreport
+- svcrash
+
+### svmap
+
+ this is a sip scanner. When launched against
+ ranges of ip address space, it will identify any SIP servers
+ which it finds on the way. Also has the option to scan hosts
+ on ranges of ports.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage>
+
+### svwar
+
+ identifies working extension lines on a PBX. A working
+ extension is one that can be registered.
+ Also tells you if the extension line requires authentication or not.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage>
+
+### svcrack
+
+ a password cracker making use of digest authentication.
+ It is able to crack passwords on both registrar servers and proxy
+ servers. Current cracking modes are either numeric ranges or
+ words from dictionary files.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage>
+
+### svreport
+
+ able to manage sessions created by the rest of the tools
+ and export to pdf, xml, csv and plain text.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage>
+
+### svcrash
+
+ responds to svwar and svcrack SIP messages with a message that
+ causes old versions to crash.
+
+ Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ>
+
+
+## Installation
+
+Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation).
+
+## Further information
+
+Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation.
+
+
+
+
+
+%prep
+%autosetup -n sipvicious-0.3.4
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-sipvicious -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Thu Mar 09 2023 Python_Bot <Python_Bot@openeuler.org> - 0.3.4-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..9bef1bd
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+113a00ac11274faf0c41ef8993ebffc8 sipvicious-0.3.4.tar.gz