diff options
author | CoprDistGit <infra@openeuler.org> | 2023-03-09 16:53:32 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2023-03-09 16:53:32 +0000 |
commit | a66a58a26bb5629eaa04986403aebb522e27f3b2 (patch) | |
tree | 1e3f0a3a63798dddcca8d501cde2b842f9fa1f75 | |
parent | 2f8535bfc442368dfe073f6db3233500ec9dfa5c (diff) |
automatic import of python-sipvicious
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-sipvicious.spec | 309 | ||||
-rw-r--r-- | sources | 1 |
3 files changed, 311 insertions, 0 deletions
@@ -0,0 +1 @@ +/sipvicious-0.3.4.tar.gz diff --git a/python-sipvicious.spec b/python-sipvicious.spec new file mode 100644 index 0000000..afaeaaa --- /dev/null +++ b/python-sipvicious.spec @@ -0,0 +1,309 @@ +%global _empty_manifest_terminate_build 0 +Name: python-sipvicious +Version: 0.3.4 +Release: 1 +Summary: SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. +License: GPL +URL: https://github.com/EnableSecurity/sipvicious +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/4c/53/b228769dd96ef86e0a557a5957682cd25af7cbc1e2118a7d34cd125b11fd/sipvicious-0.3.4.tar.gz +BuildArch: noarch + + +%description +# Welcome to SIPVicious OSS security tools + + + +SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password. + +To get started read the following: + +- [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started) +- Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/). + +For usage help make use of `-h` or `--help` switch. + +## A note to vendors and service providers + +If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro). + + +## The tools + +The SIPVicious OSS toolset consists of the following tools: + +- svmap +- svwar +- svcrack +- svreport +- svcrash + +### svmap + + this is a sip scanner. When launched against + ranges of ip address space, it will identify any SIP servers + which it finds on the way. Also has the option to scan hosts + on ranges of ports. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage> + +### svwar + + identifies working extension lines on a PBX. A working + extension is one that can be registered. + Also tells you if the extension line requires authentication or not. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage> + +### svcrack + + a password cracker making use of digest authentication. + It is able to crack passwords on both registrar servers and proxy + servers. Current cracking modes are either numeric ranges or + words from dictionary files. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage> + +### svreport + + able to manage sessions created by the rest of the tools + and export to pdf, xml, csv and plain text. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage> + +### svcrash + + responds to svwar and svcrack SIP messages with a message that + causes old versions to crash. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ> + + +## Installation + +Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation). + +## Further information + +Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation. + + + + + +%package -n python3-sipvicious +Summary: SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. +Provides: python-sipvicious +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-sipvicious +# Welcome to SIPVicious OSS security tools + + + +SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password. + +To get started read the following: + +- [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started) +- Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/). + +For usage help make use of `-h` or `--help` switch. + +## A note to vendors and service providers + +If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro). + + +## The tools + +The SIPVicious OSS toolset consists of the following tools: + +- svmap +- svwar +- svcrack +- svreport +- svcrash + +### svmap + + this is a sip scanner. When launched against + ranges of ip address space, it will identify any SIP servers + which it finds on the way. Also has the option to scan hosts + on ranges of ports. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage> + +### svwar + + identifies working extension lines on a PBX. A working + extension is one that can be registered. + Also tells you if the extension line requires authentication or not. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage> + +### svcrack + + a password cracker making use of digest authentication. + It is able to crack passwords on both registrar servers and proxy + servers. Current cracking modes are either numeric ranges or + words from dictionary files. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage> + +### svreport + + able to manage sessions created by the rest of the tools + and export to pdf, xml, csv and plain text. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage> + +### svcrash + + responds to svwar and svcrack SIP messages with a message that + causes old versions to crash. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ> + + +## Installation + +Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation). + +## Further information + +Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation. + + + + + +%package help +Summary: Development documents and examples for sipvicious +Provides: python3-sipvicious-doc +%description help +# Welcome to SIPVicious OSS security tools + + + +SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password. + +To get started read the following: + +- [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started) +- Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/). + +For usage help make use of `-h` or `--help` switch. + +## A note to vendors and service providers + +If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro). + + +## The tools + +The SIPVicious OSS toolset consists of the following tools: + +- svmap +- svwar +- svcrack +- svreport +- svcrash + +### svmap + + this is a sip scanner. When launched against + ranges of ip address space, it will identify any SIP servers + which it finds on the way. Also has the option to scan hosts + on ranges of ports. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage> + +### svwar + + identifies working extension lines on a PBX. A working + extension is one that can be registered. + Also tells you if the extension line requires authentication or not. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage> + +### svcrack + + a password cracker making use of digest authentication. + It is able to crack passwords on both registrar servers and proxy + servers. Current cracking modes are either numeric ranges or + words from dictionary files. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage> + +### svreport + + able to manage sessions created by the rest of the tools + and export to pdf, xml, csv and plain text. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage> + +### svcrash + + responds to svwar and svcrack SIP messages with a message that + causes old versions to crash. + + Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ> + + +## Installation + +Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation). + +## Further information + +Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation. + + + + + +%prep +%autosetup -n sipvicious-0.3.4 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-sipvicious -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Thu Mar 09 2023 Python_Bot <Python_Bot@openeuler.org> - 0.3.4-1 +- Package Spec generated @@ -0,0 +1 @@ +113a00ac11274faf0c41ef8993ebffc8 sipvicious-0.3.4.tar.gz |