%global _empty_manifest_terminate_build 0 Name: python-sipvicious Version: 0.3.4 Release: 1 Summary: SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. License: GPL URL: https://github.com/EnableSecurity/sipvicious Source0: https://mirrors.nju.edu.cn/pypi/web/packages/4c/53/b228769dd96ef86e0a557a5957682cd25af7cbc1e2118a7d34cd125b11fd/sipvicious-0.3.4.tar.gz BuildArch: noarch %description # Welcome to SIPVicious OSS security tools ![SIPVicious mascot](https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa) SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password. To get started read the following: - [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started) - Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/). For usage help make use of `-h` or `--help` switch. ## A note to vendors and service providers If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro). ## The tools The SIPVicious OSS toolset consists of the following tools: - svmap - svwar - svcrack - svreport - svcrash ### svmap this is a sip scanner. When launched against ranges of ip address space, it will identify any SIP servers which it finds on the way. Also has the option to scan hosts on ranges of ports. Usage: ### svwar identifies working extension lines on a PBX. A working extension is one that can be registered. Also tells you if the extension line requires authentication or not. Usage: ### svcrack a password cracker making use of digest authentication. It is able to crack passwords on both registrar servers and proxy servers. Current cracking modes are either numeric ranges or words from dictionary files. Usage: ### svreport able to manage sessions created by the rest of the tools and export to pdf, xml, csv and plain text. Usage: ### svcrash responds to svwar and svcrack SIP messages with a message that causes old versions to crash. Usage: ## Installation Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation). ## Further information Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation. %package -n python3-sipvicious Summary: SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. Provides: python-sipvicious BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-sipvicious # Welcome to SIPVicious OSS security tools ![SIPVicious mascot](https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa) SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password. To get started read the following: - [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started) - Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/). For usage help make use of `-h` or `--help` switch. ## A note to vendors and service providers If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro). ## The tools The SIPVicious OSS toolset consists of the following tools: - svmap - svwar - svcrack - svreport - svcrash ### svmap this is a sip scanner. When launched against ranges of ip address space, it will identify any SIP servers which it finds on the way. Also has the option to scan hosts on ranges of ports. Usage: ### svwar identifies working extension lines on a PBX. A working extension is one that can be registered. Also tells you if the extension line requires authentication or not. Usage: ### svcrack a password cracker making use of digest authentication. It is able to crack passwords on both registrar servers and proxy servers. Current cracking modes are either numeric ranges or words from dictionary files. Usage: ### svreport able to manage sessions created by the rest of the tools and export to pdf, xml, csv and plain text. Usage: ### svcrash responds to svwar and svcrack SIP messages with a message that causes old versions to crash. Usage: ## Installation Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation). ## Further information Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation. %package help Summary: Development documents and examples for sipvicious Provides: python3-sipvicious-doc %description help # Welcome to SIPVicious OSS security tools ![SIPVicious mascot](https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa) SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password. To get started read the following: - [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started) - Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/). For usage help make use of `-h` or `--help` switch. ## A note to vendors and service providers If you are looking for a professional grade toolset to test your RTC systems, please consider [SIPVicious PRO](https://www.sipvicious.pro). ## The tools The SIPVicious OSS toolset consists of the following tools: - svmap - svwar - svcrack - svreport - svcrash ### svmap this is a sip scanner. When launched against ranges of ip address space, it will identify any SIP servers which it finds on the way. Also has the option to scan hosts on ranges of ports. Usage: ### svwar identifies working extension lines on a PBX. A working extension is one that can be registered. Also tells you if the extension line requires authentication or not. Usage: ### svcrack a password cracker making use of digest authentication. It is able to crack passwords on both registrar servers and proxy servers. Current cracking modes are either numeric ranges or words from dictionary files. Usage: ### svreport able to manage sessions created by the rest of the tools and export to pdf, xml, csv and plain text. Usage: ### svcrash responds to svwar and svcrack SIP messages with a message that causes old versions to crash. Usage: ## Installation Please refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation). ## Further information Check out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation. %prep %autosetup -n sipvicious-0.3.4 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-sipvicious -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Fri Apr 21 2023 Python_Bot - 0.3.4-1 - Package Spec generated