VOIP

NUMEROUS LINKS TO VOIP TESTING AND MEASUREMENT TOOLS

http://www.sipcenter.com/sip.nsf/html/Testing+Measurement
http://www.voipsa.org/Resources/tools.php

RADVISION PROLAB TEST TOOLS FOR (IMS, SIP, 3G-324M AND H.323 NETWORKS) (COMMERCIAL)

http://www.radvision.com/Products/TestingTools/

THE PROLABTM SUITE OF POWERFUL TESTING TOOLS COMPLIES WITH THE MOST RECENT INDUSTRY STANDARDS AND IS SUITABLE FOR USE IN VARIOUS STAGES OF THE PRODUCT DEVELOPMENT CYCLE, QA AND PRE-DEPLOYMENT. THE PRODUCTS PERFORM ESSENTIAL AUTOMATED TESTS FOR IMS, SIP, 3G-324M AND H.323 NETWORKS AND DEVICES, INCLUDING PERFORMANCE, LOAD, STRESS, INTEROPERABILITY, MEDIA AND PROTOCOL COMPLIANCE. TESTING IS SCRIPT-DRIVEN, WHICH ALLOWS FOR MAXIMUM FLEXIBILITY AND CUSTOMIZATION, AND ENABLES THE TESTS TO BE RE-USED. THE TESTING SUITE CONTAINS HUNDREDS OF PRE-WRITTEN SCRIPTS, CANNED MESSAGES AND MEDIA FILES TO ALLOW FOR TURNKEY TEST SETUP.

THESE HIGHLY SCALABLE AND FEATURE-RICH TESTING AND VALIDATION PRODUCTS EMULATE A WIDE RANGE OF REAL-WORLD NETWORK CONDITIONS TO TEST DEVICES AND COMPONENTS IN THE RICH MEDIA COLLABORATIVE NETWORKS. THE PROLAB SUITE ALLOWS VENDORS AND SERVICE PROVIDERS TO PERFORM THE RIGOROUS TESTING AND VALIDATION NEEDED TO ENSURE HIGH QUALITY, DEPENDABLE PRODUCT DEPLOYMENT. THE PROLAB SUITE SIMULATES DIFFERENT NETWORK TOPOLOGIES AND IS SPECIFICALLY DESIGNED TO PERFORM ADVANCED SIGNALING AND MEDIA TESTS. A HIGHLY SOPHISTICATED SCHEDULING SYSTEM ENABLES COMPREHENSIVE AUTOMATED TEST PROCEDURES DURING TESTING CYCLES. THE CLIENT/SERVER APPLICATION IS CAPABLE OF MANAGING SINGLE OR MULTIPLE TEST AGENTS, SUCH AS IMS, SIP, H.323 OR 3G-324M

SIPERA (COMMERCIAL)

http://www.sipera.com/

VARIOUS SECURITY SOLUTIONS TO CIRCUMVENT THE VULNERBILITIES IN IP PBX, SIP TRUNKING, WI-FI, AND IMS PLATFORMS

OPEN SOURCE IMS CORE

http://www.openimscore.org/

THE OPEN IMS CORE IS AN IMPLEMENTATION OF IMS CALL SESSION CONTROL FUNCTIONS (CSCFS) AND A LIGHTWEIGHT HOME SUBSCRIBER SERVER (HSS), WHICH TOGETHER FORM THE CORE ELEMENTS OF ALL IMS/NGN ARCHITECTURES AS SPECIFIED TODAY WITHIN 3GPP, 3GPP2, ETSI TISPAN AND THE PACKETCABLE INTIATIVE.

SIPTESTTOOL

http://sourceforge.net/projects/siptesttool/

SIPTESTTOOL IS USED TO PROVIDE YOU A GRAPHIC USE INTERFACE SIP TEST TOOL WHICH CAN BE USED AS A TEST TOOL FOR THE TELE-GROUPS TO TEST THEIR CORE-NETWORK SOFTWARE WHICH SUPPORT SIP PROTOCOL OR AS A AS OR IMS IMPLEMENT IN 3GPP.

ONLINE BANDWIDTH CALCULATERS

http://www.voip-calculator.com/calculator/
http://www.newport-networks.com/pages/voip-bandwidth-calculator.html
http://www.bandcalc.com/
http://www.asteriskguru.com/tools/bandwidth_calculator.php

HAMMER CALL ANALYZER (COMMERCIAL)

http://www.empirix.com/default.asp?action=article&ID=69

THE HAMMER CALL ANALYZER ENABLES USERS TO VISUALIZE SIGNALING AND VOICE QUALITY PROBLEMS IN VOIP NETWORKS. FOR EXAMPLE, THE UNIQUE CALL LIST AND MULTISTAGE CALL FLOW DISPLAY FEATURES WALK ENGINEERS THROUGH THE LEGS OF A PARTICULAR CALL. IN ADDITION, THE HAMMER CALL ANALYZER DISPLAYS WAVEFORMS AND THE STREAM QUALITY SIGNATURE FOR ANY CALL. THESE FEATURES ALLOW ENGINEERS TO VISUALIZE PROBLEMS IN THE EXCHANGE OF MESSAGES BETWEEN THE VARIOUS DEVICES AND TO QUICKLY SOLVE THEM.

FEATURES:

  • INTUITIVE PROTOCOL-AWARE SEARCHING, FILTERING AND CAPTURE
  • REAL-TIME, MULTI-STAGE CALL FLOW DISPLAY
  • IP STREAM VOICE QUALITY ANALYSIS
  • VOIP AND TDM PROTOCOL DECODES
  • IMPORT EXTERNAL TRACES FOR ANALYSIS

PROTOCOLS:

VOIP – H.323 (H.225, H.245), MEGACO (H.248), MGCP, RFC 2833, T.38, RTP, RTCP, SIP, SIP-T, SKINNY (SCCP), NCS, TCP, UDP, IP, TDM – ISDN (Q.921, Q.931), SS7 (ISUP, TUP, MTP2), CCITT/ITU AND JNTT VARIANT SUPPORT

VALID 8 CONFORMANCE & EMULATION HARDWARE/SOFTWARE (COMMERCIAL)

http://www.valid8.com/products.html

VALID8.COM, THE MARKET LEADER IN CONFORMANCE AND CUSTOM EMULATION TESTING OFFERS A WIDE RANGE OF TESTING SOLUTIONS FOR VOICE OVER IP (VOIP), NEXT GENERATION NETWORKS (NGN) AND LEGACY PUBLIC SWITCHED TELEPHONE NETWORKS (PSTN) DESIGNED TO ACCELERATE DEPLOYMENT.

TRACEBUSTER

http://www.touchstone-inc.com/tbfeatures.htm

TRACEBUSTER WILL SAVE YOU COUNTLESS HOURS OF DIGGING THROUGH CAPTURE FILES! USE THE FREE TRACEBUSTER TO REPLAY/ANALYZE CALL FLOWS FROM LIBPCAP FORMAT FILES OR STEP UP TO THE PROFESSIONAL EDITIONS FOR INTEGRATED CAPTURE AND REPLAY AND AN UNRIVALED VALUE PROPOSITION!

IBM SIMULATORS FOR IMS

http://www.alphaworks.ibm.com/tech/imssimulators

THE IP MULTIMEDIA SUBSYSTEM (IMS) PROVIDES RICH MULTIMEDIA SERVICES ACROSS BOTH NEXT-GENERATION PACKET-SWITCHED AND TRADITIONAL CIRCUIT-SWITCHED NETWORKS FOR SERVICES AND APPLICATIONS; IT ALSO ENABLES TELCOS, MOBILE OPERATORS, AND OTHER SERVICE PROVIDERS. THE SUBSYSTEM IS STANDARDS-BASED AND USES OPEN INTERFACES AND FUNCTIONAL COMPONENTS THAT CAN BE ASSEMBLED FLEXIBLY INTO HARDWARE AND SOFTWARE SYSTEMS TO SUPPORT REAL-TIME INTERACTIVE SERVICES AND APPLICATIONS.
IBM SIMULATORS FOR IP MULTIMEDIA SUBSYSTEM CAN BE USED FOR DEVELOPING, TESTING, AND DEMONSTRATING SIMPLE IMS APPLICATIONS AND PROOFS-OF-CONCEPT (POC) OF SPECIFIC IMS ARCHITECTURE COMPONENTS. THESE SIMULATORS PROVIDE AN EASY WAY FOR USERS TO SIMULATE AND TEST THE IMS COMPONENTS WITHOUT ANY COMPLEX SET-UP OF IMS SERVERS OR ARCHITECTURE CONFIGURATION.

ASTEROID

http://www.infiltrated.net/asteroid/

ASTEROID IS A SIP DENIAL OF SERVICE TESTING TOOL. IT CONSISTS OF OVER 36,000 UNIQUE SIP PACKETS AND CAN BE QUICKLY MODIFIED TO CREATE OTHERS. PACKETS ARE GROUPED INTO THEIR RESPECTIVE TYPES (INVITES, BYE, CANCEL, ETC.) AND CAN BE SENT INDIVIDUALLY OR CALLED FROM A SHELL SCRIPT AND SENT IN CLUSTERS. ASTEROID HAS EFFECTIVELY CRASHED ALL VERSIONS OF ASTERISK UP UNTIL 1.2.13 AND GREATER WHICH WERE PATCHED AGAINST THE SEQUENCE WHICH CAUSED THE CRASH.

SIPVICIOUS

http://sipvicious.org/blog/

SIPVICIOUS TOOLS ADDRESS THE NEED FOR TRADITIONAL SECURITY TOOLS TO BE PORTED TO SIP. THIS PACKAGE CONSISTS OF A SIP SCANNER, A SIP WARDIALER, AND A SIP PBX CRACKER. THESE TOOLS WERE WRITTEN IN PYTHON.

SIP IRC BOT

http://www.loria.fr/~nassar/readme.html

INTERESTING PROGRAM THAT ALLOWS THE FUNCTIONALITY OF SENDING SPIT AKA SPAM, DENIAL OF SERVICE, SCANS AND PASSWORD CRACKING

SIPGREP

http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ser/sip_router/utils/sipgrep/

IT IS A WRAPPER ON NGREP WHICH:

  • FILTERS SIP MESSAGES ACCORDING NUMBER IN TO OR FROM HEADER FIELDS
  • DISPLAYS FROM TAG, TO TAG, CALL-ID AND BRANCH IN DIFFERENT COLORS, THUS IT IS POSSIBLE TO TRACE DIALOGS OR TRANSACTIONS BY "ONE LOOK INTO MESSAGE"
  • IT CAN STORE RECEIVED MESSAGES INTO A FILE AND SHOW THEM (TOGETHER)

SIPSPY

http://www.wesip.com/mediawiki/index.php/SipSpy

FEATURES:

  • EACH SIPSPY THAT CONNECTS TO A SPYAGENT, MUST AUTHENTICATE ITSELF USING A LOGIN AND PASSWORD, THESE ARE TRANSFERRED USING A DIGEST METHOD, SO THAT PASSWORDS DONT TRAVEL IN CLEAR-TEXT, AND REPLAY ATTACKS ARE AVOIDED. ALSO EACH USER IS ASSIGNED A ROLE: PLAIN OR ADMIN. ADMINS CAN CHANGE THE DEVICE ON WHICH THE SIPSPY IS MONITORING, AND CAN CHANGE THE BPF FILTER, WHEREAS PLAIN USERS CANNOT. ALSO, YOU CAN PROVIDE SPYAGENT WICH A REGEXP FOR EACH OF THE USERS. THEN, WHEN A SIPSPY PROVIDES A NEW REGEXP TO MATCH SIP PACKETS, SPYAGENT WILL MATCH THE REGEXP TO THAT REGEXP (THAT IS, A REGEXP ON A REGEXP), SO YOU CAN LIMIT THE REGEXP'S THAT USERS CAN USE TO MONITOR SIP TRAFFIC.
  • SIP DIALOGS/SESSIONS SAVE AND LOAD: SIPSPY CAN SAVE THE MONITORED PACKETS IN AN XML FILE, SO THAT WHEN SOMEONE DETECTS A BUG IN THE SIP NETWORK, THEY CAN SAVE A COPY OF THE SIP DIALOG AND SEND IT TO THE ADMINISTRATORS TO ADDRESS IT.
  • SERVER-BASED SESSION SAVING: IF ONE OF YOUR USERS/ADMINS DETECTS A BUG IN THE SIP NETWORK, YOU CAN ASK HIM TO REPRODUCE THE BUG AND MONITOR ALL THE SIP PACKETS INVOLVED, AND THEN SAVE THAT SIP SESSION TO THE SERVER, SO THE NEXT MORNING WHEN DEVELOPERS GO TO WORK, THEY CAN DOWNLOAD FROM THE SERVER THE BUGGY SIP DIALOG.

WIST

http://www.devel-it.org/index.php?modulo=projetos&id=2

THIS SOFTWARE WAS BORN AS A PROF CONCEPT IDEA TO CAPTURE SIP TRAFFIC FROM A REMOTE HOST (SIP PROXY, GATEWAY, ETC) AND SHOW LIVE SIP MESSAGES ABOUT AN SPECIFIC DIALOG (FILTERED BY THE FROM SIP USER) TO HELP DEBUG SIP TRANSACTIONS IN A FRIENDLY WAY.

SIP PROXY TOOL

http://sourceforge.net/projects/sipproxy/

WITH THE SIP PROXY TOOL YOU WILL HAVE THE OPPORTUNITY TO CHECK AND MANIPULATE SIP MESSAGES. FURTHERMORE YOU WILL BE ABLE TO RUN SEVERAL AUTOMATED ATTACKS AND GETTING THE RESULTS AS A REPORT. SOME OF THESE ATTACKS WILL USE FUZZING TECHNOLOGY.

SIP MESSENGER

http://www.sipcenter.com/sip.nsf/html/Compliance+Engine

SIP MESSENGER IS JAVA SOFTWARE THAT ALLOWS YOU TO SEND SIP TEST MESSAGES FROM TEXT FILES OVER UDP TO YOUR SIP IMPLEMENTATION AND, OPTIONALLY, LISTEN FOR RESPONSES. THE MESSAGES CAN BE SENT USING A COMMAND LINE UTILITY (MESSENGER), SUITABLE FOR INVOCATION BY AUTOMATED SCRIPTING, OR VIA A GUI (MESSENGERGUI). DEVELOPERS CAN USE THIS SOFTWARE TO CONSTRUCT THEIR OWN SIP MESSAGES THAT CAN BE PUSHED ONTO SIP SERVERS OR USER AGENTS (POSSIBLY IN CONJUNCTION WITH THE SIP CENTER¹S OWN SIP RESOURCES – THE SIP NETWORK SERVER AND UA). THIS TOOL IS ESPECIALLY USEFUL FOR STRESS TESTING PRODUCTS WITH SCENARIOS THAT ARE OTHERWISE DIFFICULT TO REPRODUCE. THIS SOFTWARE HAS BEEN MADE AVAILABLE BY UBIQUITY SOFTWARE CORPORATION; FOUNDER OF THE SIP CENTER

PJSIP-PERF

http://www.pjsip.org/pjmedia/docs/html/page_pjsip_perf_c.htm

PJSIP-PERF IS A COMPLETE PROGRAM TO MEASURE THE PERFORMANCE OF PJSIP OR OTHER SIP ENDPOINTS. IT CONSISTS OF TWO PARTS:

  • THE SERVER, TO RESPOND INCOMING REQUESTS
  • THE CLIENT, WHO ACTIVELY SUBMITS REQUESTS AND MEASURE THE PERFORMANCE OF THE SERVER.

BOTH SERVER AND CLIENT PART CAN RUN SIMULTANEOUSLY, TO MEASURE THE PERFORMANCE WHEN BOTH ENDPOINTS ARE CO-LOCATED IN A SINGLE PROGRAM.
THE SERVER ACCEPTS BOTH INVITE AND NON-INVITE REQUESTS. THE SERVER EXPORTS SEVERAL DIFFERENT TYPES OF URL, WHICH WOULD CONTROL HOW THE REQUEST WOULD BE HANDLED BY THE SERVER:

  • URL WITH "0" AS THE USER PART WILL BE HANDLED STATELESSLY. IT SHOULD NOT BE USED WITH INVITE METHOD.
  • URL WITH "1" AS THE USER PART WILL BE HANDLED STATEFULLY. IF THE REQUEST IS AN INVITE REQUEST, INVITE TRANSACTION WILL BE CREATED AND 200/OK RESPONSE WILL BE SENT, ALONG WITH A VALID SDP BODY. HOWEVER, THE SDP IS JUST A STATIC TEXT BODY, AND IS NOT A PROPER SDP GENERATED BY PJMEDIA.
  • URL WITH "2" AS THE USER PART IS ONLY MEANINGFUL FOR INVITE REQUESTS, AS IT WOULD BE HANDLED CALL-STATEFULLY BY THE SERVER. FOR THIS URL, THE SERVER ALSO WOULD GENERATE SDP DYNAMICALLY AND PERFORM A PROPER SDP NEGOTIATION FOR THE INCOMING CALL. ALSO FOR EVERY CALL, SERVER WILL LIMIT THE CALL DURATION TO 10 SECONDS, ON WHICH THE CALL WILL BE TERMINATED IF THE CLIENT DOESN'T HANGUP THE CALL.

SIPP

http://sipp.sourceforge.net/

SIPP IS A PERFORMANCE TESTING TRAFFIC TOOL FOR THE SIP PROTOCOL. IT INCLUDES A FEW BASIC SIPSTONE USER AGENT SCENARIOS (UAC AND UAS) AND ESTABLISHES AND RELEASES MULTIPLE CALLS WITH THE INVITE AND BYE METHODS. IT CAN ALSO READ XML SCENARIO FILES DESCRIBING ANY PERFORMANCE TESTING CONFIGURATION. IT FEATURES THE DYNAMIC DISPLAY OF STATISTICS ABOUT RUNNING TESTS (CALL RATE, ROUND TRIP DELAY, AND MESSAGE STATISTICS), PERIODIC CSV STATISTICS DUMPS, TCP AND UDP OVER MULTIPLE SOCKETS OR MULTIPLEXED WITH RETRANSMISSION MANAGEMENT, REGULAR EXPRESSIONS AND VARIABLES IN SCENARIO FILES, AND DYNAMICALLY ADJUSTABLE CALL RATES.
SIPP CAN BE USED TO TEST MANY REAL SIP PLATFORMS LIKE SIP PROXIES, B2BUAS, SIP MEDIA SERVERS, SIP/X GATEWAYS, SIP PBX…. IT IS ALSO VERY USEFUL TO EMULATE THOUSANDS OF USER AGENTS CALLING YOUR SIP SYSTEM.

RTP TOOLS

http://www.cs.columbia.edu/IRT/software/rtptools/

THE RTPTOOLS DISTRIBUTION CONSISTS OF A NUMBER OF SMALL APPLICATIONS THAT CAN BE USED FOR PROCESSING RTP DATA.

  • RTPPLAY PLAY BACK RTP SESSIONS RECORDED BY RTPDUMP
  • RTPSEND GENERATE RTP PACKETS FROM TEXTUAL DESCRIPTION, GENERATED BY HAND OR RTPDUMP
  • RTPDUMP PARSE AND PRINT RTP PACKETS, GENERATING OUTPUT FILES SUITABLE FOR RTPPLAY AND RTPSEND
  • RTPTRANS RTP TRANSLATOR BETWEEN UNICAST AND MULTICAST NETWORKS; ALSO TRANSLATES BETWEEN VAT AND RTP FORMATS.

RTPBREAK

http://xenion.antifork.org/rtpbreak/index.html

RTPBREAK DETECTS, RECONSTRUCTS AND ANALYZES ANY RTP [RFC1889] SESSION THROUGH HEURISTICS OVER THE UDP NETWORK TRAFFIC. IT WORKS WELL WITH SIP, H.323, SCCP AND ANY OTHER SIGNALING PROTOCOL. IN PARTICULAR, IT DOESN'T REQUIRE THE PRESENCE OF RTCP PACKETS (VOIPONG NEEDS THEM) THAT AREN'T ALWAYS TRANSMITTED FROM THE RECENT VOIP CLIENTS.

SIP SEND FUN

http://www.security-scans.de/index.php?where=ssf

SIP SEND FUN USES NETCAT TO SEND THE DIFFERENT SIP-PAYLOAD TO THE TESTED DEVICE. THE FOLLOWING FUNCTIONS ARE IMPLEMENTED:

  • PAYLOAD: NEW-MESSAGE, NO-NEW-MESSAGE, INVITE
  • TEST OF A SINGLE DEVICE OR A CLASS-C SCAN
  • SOURCE-IP SPOOFING
  • SEND PAYLOAD TO A SINGLE PORT OR PORTSCAN

SIPCRACK

http://www.codito.de/

SIPCRACK IS A PROTOCOL LOGIN CRACKER. IT CONTAINS 2 PROGRAMS, SIPDUMP TO SNIFF SIP LOGINS OVER THE NETWORK AND SIPCRACK TO BRUTEFORCE THE PASSWORDS OF THE SNIFFED LOGINS

SMAP

http://www.wormulon.net/files/pub/smap-blackhat.tar.gz

SMAP IS A COMBINATION OF NMAP AND SIPSAK. TO SUM UP FUNCTIONALITY IN ONE SENTENCE IT AIDES IN BOTH LOCATING AND FINGERPRINTING REMOTE SIP DEVICES.

SIP ANALYZER

http://sourceforge.net/projects/sipanalzyer

OR

http://ant.comm.ccu.edu.tw/sip/

DISTRIBUTED SIP ANALYZER IS A SIP PROTOCOL ANALYZER FOR UNIX. IT ALLOWS YOU TO EXAMINE SIP FROM DIFFERENT LOCAL AREA NETWORK. YOU CAN INTERACTIVELY BROWSE THE CAPTURE DATA, VIEWING CALLFLOW SEQUENCE DIAGRAM AND DETAIL INFORMATION FOR EACH SIP SESSION.

SIP CALLFLOW SEQUENCE DIAGRAM GENERATOR

http://sourceforge.net/project/showfiles.php?group_id=60608

THE CALLFLOW SEQUENCE DIAGRAM GENERATOR IS A COLLECTION OF AWK AND SHELL SCRIPTS THAT WILL TAKE A PACKET CAPTURE FILE THAT CAN BE READ BY ETHEREAL AND PRODUCE A TIME SEQUENCE DIAGRAM. THIS IS USEFUL TO VIEW AND DEBUG SIP CALLFLOWS OR OTHER NETWORK TRAFFIC

SIPFLOW STANDARD

http://www.sipient.com/standard.html

SIPFLOW STANDARD CAPTURES DATA ON A SINGLE HOST AND DISPLAYS SIP CALLFLOWS IN AN INTUITIVE GRAPHICAL FORMAT. SIP MESSAGES MAY BE VIEWED AS LADDER DIAGRAMS, OR THEIR CONTENTS MAY BE INSPECTED BY DOUBLE CLICKING AN ARROW IN THE LADDER DIAGRAM. THIS ALLOWS NETWORK ENGINEERS TO QUICKLY IDENTIFY THE BEHAVIOR OF THEIR SIP NETWORK WITHOUT TRACING THROUGH LOG FILES OR RAW CAPTURES.

SIPFLOW STANDARD CURRENTLY SUPPORTS:

  • UDP AND TCP
  • IP FILTERS
  • SIP FILTERS (METHOD, TO AND FROM)
  • SEARCHING CAPABILITIES
  • IMPORTING ETHEREAL AND TCPDUMP CAPTURES
  • REASSEMBLING FRAGMENTED PACKETS
  • MAPPING IP ADDRESS TO NAMES
  • SIP MESSAGE LOGGING

SIP SCENARIO (CALL FLOW SEQUENCE DIAGRAM GENERATOR)

http://www1.cs.columbia.edu/sip/download/sip_scenario/

THIS PROGRAM MAKES SIP CALLFLOWS (SCENARIOS) DIAGRAMS FROM A SIGNALING TRACE. THE PROGRAM READS THE LIBPCAP OUTPUT FORMAT CREATED BY ETHEREAL, TCPDUMP, ETC) AND CREATES SIP SCENARIO (CALL FLOWS).

EACH ETHERNET PACKET THAT IS CONTAINED IN THE LIBPCAP TRACE FILE IS CALLED A PHYSICAL FRAME. EACH PACKET IS GIVEN A SEQUENCE NUMBER CALLED THE PHYSICAL FRAME NUMBER. THE PHYSICAL FRAME NUMBER IS USED FOR DOCUMENTATIONS AS A REFERENCE TO A FIXED LOCATION.
EACH SIP MESSAGE THAT IS DISPLAYED IS IDENTIFIED BY A SEQUENTIAL NUMBER CALLED THE SIP FRAME NUMBER.
ALL UDP AND TCP PACKETS WILL BE WILL BE PARSED TO CHECK IF THERE ARE SIP MESSAGES OR NOT. NON-SIP MESSAGES WILL BE AUTOMATICALLY FILTERED OUT OF THE DISPLAY.
DIFFERENT SIP CALLS (BASED ON CALLID) WILL BE INDICATED IN DIFFERENT COLORS. LINKS ARE MADE FROM THE SIP SCENARIO (CALL FLOW) TO THE ACTUAL SIP MESSAGE (FRAME DATA).

SIPBOMBER

http://www.metalinkltd.com/downloads.php

SIPBOMBER IS INVALUABLE TOOL FOR SIP DEVELOPERS INTENDED FOR TESTING SIP-PROTOCOL IMPLEMENTATION AGAINST RFC3261. CURRENT VERSION CAN CHECK ONLY SERVER IMPLEMENTATIONS – (PROXIES, USER AGENT SERVERS, REDIRECT SERVERS, AND REGISTRARS). THIS PROGRAM IS DISTRIBUTED UNDER TERMS OF GPL.

HACKING VOIP EXPOSED TOOLS

http://www.hackingvoip.com/sec_tools.html

TOOLS WRITTEN FOR THE BOOK AND LISTED ARE: VLANPING, SIPSCAN, TFTP BRUTE FORCER WITH TFTP BRUTEFORCE FILE, IAX FLOOD, UDP FLOODER, UDP FLOODER W/VLAN SUPPORT, BYE CALL TEARDOWN, RTP FLOODER, INVITE FLOODER, CHECK SYNC PHONE REBOOTER, RTP INJECTOR, REGISTRATION HIJACKER, REGISTRATION ERASER, REGISTRATION ADDER

IETF SIP TORTURE MESSAGES

http://tools.ietf.org/wg/sipping/draft-ietf-sipping-torture-tests/

THESE MESSAGES WERE DEVELOPED AND REFINED AT THE SIPIT INTEROPERABILITY TEST EVENT. DURING THE EVENTS PROBLEMATIC MESSAGES WERE NOTED AND RELEASED AS AN IETF-DRAFT. IT DEFINES TENS OF VALID AND INVALID MESSAGES, DESCRIBES THEM AND GIVES DIRECTIONS AS TO HOW THE SIP APPLICATION SHOULD REACT.

SIPSAK

http://sipsak.org/

SIPSAK IS A SMALL COMMAND LINE TOOL FOR DEVELOPERS AND ADMINISTRATORS OF SESSION INITIATION PROTOCOL (SIP) APPLICATIONS. IT CAN BE USED FOR SOME SIMPLE TESTS ON SIP APPLICATIONS AND DEVICES.

FEATURES:

  • SENDS OPTIONS REQUEST
  • SENDS TEXT FILES (WHICH SHOULD CONTAIN SIP REQUESTS)
  • TRACEROUTE (SEE SECTION 11 IN RFC3261)
  • USER LOCATION TEST
  • FLOODING TEST
  • RANDOM CHARACTER TRASHED TEST
  • INTERPRET AND REACT ON RESPONSE
  • AUTHENTICATION WITH QOP SUPPORTED (MD5 AND SHA1)
  • SHORT NOTATION SUPPORTED FOR RECEIVING (NOT FOR SENDING)
  • UNLIMITED STRING REPLACEMENTS IN FILES AND REQUESTS
  • ADD ANY HEADER TO THE REQUESTS
  • CAN SIMULATE CALLS IN USRLOC MODE
  • USES SYMMETRIC SIGNALING AND THUS SHOULD WORK BEHIND NAT
  • CAN UPLOAD ANY GIVEN CONTACT TO A REGISTRAR
  • SEND MESSAGES TO ANY SIP DESTINATION
  • NAGIOS COMPLIANT RETURN CODES
  • SEARCH FOR STRINGS IN REPLY WITH SIGNALING EXPRESSION
  • USE MULTIPLE PROCESSES TO CREATE MORE SERVER LOAD
  • READ SIP MESSAGE FROM STDIN (E.G. FROM A PIPE `|')
  • SUPPORTS DNS SRV THROUGH C-ARES OR LIBRULI
  • SUPPORTS UDP AND TCP TRANSPORT

PROTOS SIP CONFORMANCE TEST SUITE

http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/sip/#download

THE PURPOSE OF THIS TEST-SUITE IS TO EVALUATE IMPLEMENTATION LEVEL SECURITY AND ROBUSTNESS OF SESSION INITIATION PROTOCOL (SIP) IMPLEMENTATIONS. THE FACTORS BEHIND CHOOSING SIP INCLUDED:

  • SIP HAS MATURED FROM ACADEMIC INTEREST INTO INDUSTRIAL PROTOCOL WITH POTENTIAL FOR WIDE DEPLOYMENT. HOWEVER, FIELD USAGE APPEARS TO BE IN EARLY STAGES. THIS STAGE OF THE LIFE-CYCLE IS BOTH AN OPPORTUNITY AND A CHALLENGE FROM SOFTWARE VULNERABILITY PROCESS PERSPECTIVE. BY APPLYING THE PROTOS APPROACH IN THIS CONTEXT WE HOPE TO PROVE THAT THE EARLY BIRD CATCHES THE WORM IN SENSE THAT PATCH AND PENETRATE CYCLES WITH RESPECT TO SOME TRIVIAL VULNERABILITIES MAY BE AVOIDED.
  • FURTHERMORE SIP IS BEING ADOPTED BY THE THIRD GENERATION PARTNERSHIP PROJECT (3GPP) AS PART OF THE THIRD GENERATION MOBILE ARCHITECTURE.
  • THE SIP FAMILY OF SPECIFICATIONS IS EXPANDING AND SOME ASPECTS ARE UNDER DEVELOPMENT. THIS ENCOURAGES SIP AS A NATURAL CANDIDATE FOR EXPERIMENTING WITH ITERATIVE IMPROVEMENT OF A ROBUSTNESS TEST-SUITE WITH MORE COMPREHENSIVE RELEASES TO FOLLOW.
  • A HTTP-LIKE ASCII PRESENTATION OF THE SIP MESSAGES MAY INITIALLY ATTRACT MORE SCRIPT-KIDDIE LEVEL HOSTILITY (VULNERABILITY ASSESSMENT) THAN THE RIVAL PROTOCOLS WITH COMPLEX ENCODINGS HAVE ATTRACTED SO FAR. IN THIS TEST-SUITE, THE FOCUS WAS SET ON A SPECIFIC PROTOCOL DATA UNIT (PDU), NAMELY INVITE MESSAGE. RATIONALE BEHIND THIS SELECTION WAS:
  • TWO IMPORTANT SIP ENTITY TYPES, USER AGENTS AND PROXIES, HAVE TO SUPPORT THE INVITE-METHOD.
  • SIP USER AGENTS AND SIP PROXIES ARE BY DESIGN READY TO ACCEPT INCOMING INVITATIONS WITHOUT PRIOR SESSION SETUP. THIS EXPOSES A NATURAL ATTACK VECTOR THAT SHOULD BE SCRUTINIZED WITH TOP PRIORITY.
  • THE INVITE-METHOD CONTAINS A WIDE RANGE OF HEADER-FIELDS AND MAY CARRY SESSION DESCRIPTION PROTOCOL (SDP) DATA. THUS A CONSIDERABLE PORTION OF THE UNDERLYING CODE IS EXPOSED TO TESTING VIA SINGLE PDU-TYPE.

PROTOS H225 PROTOCOL COMPLIANCE

http://www.ee.oulu.fi/research/ouspg/protos/testing/c07/h2250v4/index.html

THE PURPOSE OF THIS TEST-SUITE IS TO EVALUATE IMPLEMENTATION LEVEL SECURITY AND ROBUSTNESS OF H.225.0 IMPLEMENTATIONS. H.225.0 IS A PROTOCOL RESPONSIBLE FOR SIGNALING AND SETTING UP H.323 CALLS. THE FACTORS BEHIND CHOOSING H.225.0 INCLUDED:

  • H.323 IS THE DE-FACTO STANDARD FOR VOICE OVER IP (VOIP) AND CONFERENCING AND IT IS WIDELY DEPLOYED. MOREOVER, BASED ON LACK OF PRIOR KNOWN VULNERABILITY ANNOUNCEMENTS IT APPEARS THAT THE H.323 HAS NOT BEEN CLOSELY SCRUTINIZED OR IMPLEMENTATIONS ARE UNCOMMONLY ROBUST.
  • H.225.0 IS THE FIRST AND MOST COMMONLY EXPOSED INTERFACE TO H.323 SESSION ESTABLISHMENT.
  • H.225.0 MUST BE IMPLEMENTED BY MOST H.323 COMPONENTS, NAMELY BY TERMINALS, GATEWAYS, PROXIES AND MULTI-POINT CONTROL UNITS.
  • DUE TO FIREWALL UNFRIENDLY AND DYNAMIC BEHAVIOR OF H.323, MANY FIREWALL PRODUCTS CONTAIN COMPLEX H.225.0 PARSING CODE THAT SHOULD BE TESTED FOR ROBUSTNESS DUE TO CRITICAL PLACEMENT OF POTENTIALLY VULNERABLE CODE. THE SCOPE OF THE TEST-SUITE WAS NARROWED TO H.225.0 VERSION 4 SETUP-PDU. RATIONALE BEHIND THIS SELECTION WAS:
  • SETUP IS THE FIRST MESSAGE SENT TO A TARGET H.323 ENDPOINT UPON CALL SIGNALING, IT IS EASY TO DELIVER TEST-CASES AND TO RESTORE THE IMPLEMENTATION BACK TO ITS INITIAL STATE BY DISCONNECTING.
  • CERTAIN SECURITY MEASURES CAN BE ENFORCED ONLY AFTER THE SETUP-PDU HAS BEEN PARSED AND IMPLEMENTATIONS ARE BY DESIGN READY TO ACCEPT INCOMING SETUP MESSAGES.
  • H.225.0 IMPLEMENTS A SUBSET OF RECOMMENDATION Q.931 WHICH IS USED IN ISDN SIGNALING. CERTAIN ELEMENTS OF Q.931 UTILIZE BER ENCODED ASN.1.
  • MANY INFORMATION ELEMENTS USED IN H.225.0 CAN BE INCLUDED IN SETUP-PDU.
  • THE USER-USER INFORMATION ELEMENT IN H.225.0 UTILIZES COMPLEX ASN.1 PACKET ENCODING RULES (PER) WHICH ARE ALSO USED IN H.225.0 RAS (REGISTRATION, ADMISSION, AND STATUS) MESSAGES BETWEEN H.323 ENDPOINTS AND GATEKEEPERS.

SIVUS

http://www.vopsecurity.org/index.php

SIVUS IS THE FIRST PUBLICLY AVAILABLE VULNERABILITY SCANNER FOR VOIP NETWORKS THAT USE THE SIP PROTOCOL. SIVUS IS USED PRIMARILY BY DEVELOPERS, ADMINISTRATORS, NETWORK DESIGNERS, MANAGERS AND CONSULTANTS TO VERIFY THE ROBUSTNESS AND SECURITY OF THEIR SIP IMPLEMENTATIONS BY GENERATING THE ATTACKS THAT ARE INCLUDED IN THE SIVUS DATABASE OR BY CRAFTING THEIR OWN SIP MESSAGES USING THE SIP MESSAGE GENERATOR.

VOIPONG

http://www.enderunix.org/voipong/

VOIPONG IS A UTILITY WHICH DETECTS ALL VOICE OVER IP CALLS ON A PIPELINE, AND FOR THOSE WHICH ARE G711 ENCODED, DUMPS ACTUAL CONVERSATION TO SEPARATE WAVE FILES. IT SUPPORTS SIP, H323, CISCO’S SKINNY CLIENT PROTOCOL, RTP AND RTCP. IT'S BEEN WRITTEN IN C LANGUAGE FOR PERFORMANCE REASONS, PROVED TO BE RUNNING ON SOLARIS, LINUX AND FREEBSD; THOUGH IT'S THOUGHT TO COMPILE AND RUN ON OTHER PLATFORMS AS WELL. ON A 45 MBIT/SEC ACTUAL NETWORK TRAFFIC, IT'S BEEN VERIFIED THAT VOIPONG SUCCESSFULLY DETECTED ALL VOIP GATEWAYS AND THE VOIP CALLS. CPU UTILIZATION DURING THE RUN HAS BEEN FOUND RANGING BETWEEN 66% - 80% ON A 256MB RAM, CELERON 1700 MHZ TOSHIBA NOTEBOOK.

SIP TEST TOOL (COMMERCIAL)

http://voip.hcltech.com/artDisplay.asp?art_id=1226&cat_id=523

HCL OFFERS A COMPREHENSIVE SIP TEST TOOL SUITED FOR CONFORMANCE, REGRESSION, INTEGRATION TESTING AND TEST AUTOMATION NEEDS OF SIP BASED COMPONENTS SUCH AS SIP USER AGENT AND SERVER. SIP TEST TOOL CONTAINS A CONFORMANCE TEST SUITE FOR CONFORMANCE TESTING OF DIFFERENT SIP COMPONENTS SUCH AS USER AGENT, PROXY, REGISTRAR, SIP B2BUA, PRESENCE, AND IM SERVERS AND STUN. SIP CONFORMANCE TEST SUITE PROVIDES A NUMBER OF PRE-DEFINED TEST CASES FOR CHECKING THE CONFORMANCE OF PARTICULAR NETWORK COMPONENT UNDER TEST. THESE TEST CASES CHECK FOR A SPECIFIED FUNCTIONALITY AND RETURN THE TEST RESULTS AS PASS, FAIL OR SKIP. SIP TEST TOOL PROVIDES THE HOOKS FOR TEST AUTOMATION AND WITH THE HELP OF APIS, USER CAN AUTOMATE THE ENTIRE TEST PROCESS.

FEATURES OF THE SIP TEST TOOL:

  • AUTOMATED TEST FRAMEWORK ARCHITECTURE SUITABLE FOR VOIP PROTOCOLS
  • SINGLE PLATFORM FOR PROTOCOL CONFORMANCE, CALL FLOW, INTEGRATION, REGRESSION TESTING REQUIREMENTS
  • BETTER PROTOCOL CONFORMANCE AND HIGHER INTEROPERABILITY
  • TEST AUTOMATION HOOKS FOR EASE OF AUTOMATION
  • HIGH TEST CASE DENSITY WITH AROUND 1000 READYMADE TEST CASES AVAILABLE
  • EASY USAGE WITH GUI BASED EXECUTION AND RESULT ANALYSIS
  • PACKAGING FLEXIBILITY

NOTE: HCL TECHNOLOGIES ALSO HAS A DIAMETER TOOL THAT CAN BE FOUND AT THE BELOW URL.

http://voip.hcltech.com/artdisplay.asp?cat_id=458&art_id=1306

WINSIP

http://www.touchstone-inc.com/winsip.htm

YOU CAN USE WINSIP TO SIMULATE USER INPUT, GENERATE HIGH-QUALITY AUDIO AND VIDEO STREAMS, AND CONTROL IT FROM THE COMMAND LINE TO AUTOMATE TESTING. WINSIP ACTS AS THOUSANDS OF SIMULTANEOUS INDIVIDUAL ENDPOINTS OR CONNECTIONS IN ANY ONE OF THE FOLLOWING MODES OF OPERATION:

  • INITIATE CALLS
  • ANSWER CALLS
  • UNATTENDED ANSWER
  • REGISTRAR TEST
  • PROXY SERVER

CODENOMICON DEFENSICS(COMMERCIAL)

http://www.codenomicon.com/products/protocols.shtml

CODENOMICON DEFENSICS OFFERS UNPARALLELED BLACKBOX, NEGATIVE TESTING AGAINST THE BROADEST SET OF APPLICATIONS; SPANNING OVER 130 INTERNET, WIRELESS AND DIGITAL MEDIA PROTOCOLS.

NETIQ VIVINET DIAGNOSTICS (COMMERCIAL)

http://www.netiq.com/products/vd/default.asp

THE NETIQ VIVINET DIAGNOSTICS PRODUCT (VIVINET DIAGNOSTICS) QUICKLY PINPOINTS CALL QUALITY PROBLEMS IN VOICE OVER IP (VOIP) NETWORKS AND EXPLAINS WHY YOU ARE EXPERIENCING REDUCED CALL QUALITY. VIVINET DIAGNOSTICS REDUCES THE TIME NEEDED TO RESOLVE VOICE QUALITY ISSUES AND LESSENS THE SKILLS REQUIRED FOR VOIP TROUBLESHOOTING, IN BOTH PRE- AND POST-DEPLOYMENT ENVIRONMENTS. THOUGH SIMPLE TO USE, THE PRODUCT PROVIDES THE DATA NEEDED TO TROUBLESHOOT COMPLEX VOIP PROBLEMS IN CISCO AND NORTEL ENVIRONMENTS.

OREKA

http://oreka.sourceforge.net/

OREKA IS A MODULAR AND CROSS-PLATFORM SYSTEM FOR RECORDING AND RETRIEVAL OF AUDIO STREAMS. THE PROJECT CURRENTLY SUPPORTS VOIP AND SOUND DEVICE BASED CAPTURE. RECORDINGS METADATA CAN BE STORED IN ANY MAINSTREAM DATABASE. RETRIEVAL OF CAPTURED SESSIONS IS WEB BASED.

OREKA CURRENTLY HAS THE FOLLOWING FEATURES:

  • RECORD VOIP RTP SESSIONS BY PASSIVELY LISTENING TO NETWORK PACKETS. BOTH SIDES OF A CONVERSATION ARE MIXED TOGETHER AND EACH CALL IS LOGGED AS A SEPARATE AUDIO FILE. WHEN SIP OR CISCO SKINNY (SCCP) SIGNALING IS DETECTED, THE ASSOCIATED METADATA IS ALSO EXTRACTED
  • RECORD FROM A STANDARD SOUND DEVICE (E.G. MICROPHONE OR LINE INPUT). CAN RECORD MULTIPLE CHANNELS AT THE SAME TIME. EACH RECORDING GOES TO SEPARATE AUDIO FILES
  • OPEN PLUGIN ARCHITECTURE FOR AUDIO CAPTURE MEANS THAT THE SYSTEM IS POTENTIALLY CAPABLE OF RECORDING FROM ANY AUDIO SOURCE
  • PLUGIN ARCHITECTURE FOR CODECS OR ANY OTHER SIGNAL PROCESSING FILTER
  • AUTOMATIC AUDIO SEGMENTATION SO THAT CONTINUOUS AUDIO SOURCES CAN BE SPLIT IN SEPARATE AUDIO FILES AND EASILY RETRIEVED LATER
  • CAPTURE FROM MULTIPLE NETWORK DEVICES IN PARALLEL
  • CAPTURE FROM PCAP TRACE FILES
  • VOICE ACTIVITY DETECTION
  • A-LAW, U-LAW AND GSM6.10 CODECS SUPPORTED AS BOTH WIRE AND STORAGE FORMAT
  • AUTOMATIC TRANSCODING FROM WIRE FORMAT TO STORAGE FORMAT
  • RECORDING METADATA LOGGED TO FILE AND/OR ANY MAINSTREAM DATABASE SYSTEM USER INTERFACE RECORDINGS RETRIEVAL CAN BE DONE USING THE FOLLOWING CRITERIA (WHEN AVAILABLE):
  • TIMESTAMP
  • RECORDING DURATION
  • DIRECTION (FOR A TELEPHONE CALL)
  • REMOTE PARTY (FOR A TELEPHONE CALL)
  • LOCAL PARTY (FOR A TELEPHONE CALL)

COMPATIBILITY:
OREKA HAS BEEN REPORTED TO WORK ON THE FOLLOWING PLATFORMS AND SHOULD ACTUALLY WORK ON MANY MORE.

  • CISCO CALLMANAGER AND CALLMANAGER EXPRESS V. 3.X, 4.X AND 5
  • LUCENT APX8000
  • AVAYA S8500
  • SIEMENS HIPATH
  • VOCALDATA
  • SYLANTRO
  • ASTERISK SIP CHANNEL

IWAR

http://www.softwink.com/iwar/

CURRENT FEATURES:

  • FULL AND NORMAL LOGGING: FULL LOGGING RECORDS ALL POSSIBLE EVENTS DURING DIALING (BUSY SIGNALS, NO ANSWERS, CARRIERS, ETC). BY DEFAULT IT ONLY RECORDS THINGS THAT WE MIGHT FIND INTERESTING (CARRIERS, POSSIBLE TELCO EQUIPMENT).
  • ASCII FLAT FILE AND MYSQL LOGGING: YOU CAN LOG TO A TRADITIONAL ASCII FLAT FILE, AND RECORD INFORMATION INTO A MYSQL DATABASE.
  • DIALS RANDOMLY OR SEQUENTIALLY.
  • REMOTE SYSTEM IDENTIFICATION: WHEN FINDING A REMOTE MODEM AND CONNECTING, IWAR WILL REMAIN CONNECTED AND ATTEMPT TO IDENTIFY THE REMOTE SYSTEM TYPE.
  • KEY STROKE MARKING: WHEN ACTIVELY "LISTENING" TO IWAR WORK, IF YOU HEAR SOMETHING INTERESTING, YOU CAN MANUALLY "MARK" IT BY HITTING A KEY. YOU CAN ALSO ENTER A "NOTE" ABOUT SOMETHING YOU FIND INTERESTING.
  • MULTIPLE MODEM SUPPORT, BECAUSE… WELL, HEY - THIS IS "UNIX". IWAR WILL SUPPORT AS MANY MODEMS YOU CAN HOOK UP
  • NICE "CURSES" BASED DISPLAY. THIS MEANS THAT IF YOU'RE USING IWAR FROM A LINUX CONSOLE OR A VT100 BASED TERMINAL, IT SHOULD WORK FINE. IT'S NOT A ESCAPE SEQUENCE KLUDGE, BUT TRUE "CURSES".
  • FULL CONTROL OVER THE MODEM: UNLIKE OTHER 'KLUDGES', IWAR DOESN'T JUST OPEN THE MODEM AS A TYPICAL "FILE". IT CONTROLS THE BAUD RATE, PARITY, AND CTS/RTS (HARDWARE FLOW CONTROL) DTR (DATA TERMINAL READY). THIS IS IMPORTANT FOR CONTROLLING THE MODEM AND MAKING IT PREFORM THE WAY YOU WANT IT TO DURING SCANNING. FOR EXAMPLE, DTR HANG UPS.
  • BLACKLISTED PHONE NUMBER SUPPORT: FOR NUMBERS THE SYSTEM SHOULD NEVER DIAL.
  • SAVE STATE: IF WITHIN THE MIDDLE OF A "WARDIALING" SESSION YOU WANT TO QUIT, YOU CAN SAVE THE CURRENT STATE TO A FILE. THIS ALLOWS YOU TO COME BACK LATER AND RESTART IWAR WHERE YOU LEFT OFF. (VIA THE '-L' OPTION)
  • LOAD PRE-GENERATED NUMBERS: YOU CAN LOAD A FILE (VIA THE '-L' OPTION) OF NUMBERS THAT YOU WANT TO DIAL. THIS IS USEFUL IF YOU WANT TO LOAD NUMBERS GENERATED BY ANOTHER ROUTINE (PERL/SHELL SCRIPT/ETC).
  • TONE LOCATION, IF YOUR MODEM SUPPORTS IT. IWAR USES TWO DIFFERENT METHODS. THE TRADITIONAL "ATDT5551212W;" (TONELOC) AND "SILENCE" DETECTION.
  • RECORDS REMOTE SYSTEM BANNERS ON CONNECTION FOR LATER REVIEW
  • IWAR CAN BE USED TO ATTACK PBX'S AND VOICE MAIL SYSTEMS
  • TERMINAL WINDOW SO YOU CAN WATCH MODEM INTERACTIONS AND CARRIER RESULTS IN REAL TIME
  • SUPPORT THE IAX2 (INTRA-ASTERISK EXCHANGE) "VOICE OVER IP" (VOIP) PROTOCOL. THIS ALLOWS YOU TO SCAN WITHOUT THE NEED OF ADDITIONAL HARDWARE! TO MY KNOWLEDGE, IWAR IS THE FIRST WAR DIALER WITH VOIP FUNCTIONALITY
  • IN IAX2 MODE, IWAR ACTS AS A "FULL BLOWN" VOIP CLIENT. IN THIS MODE, KEY 0-9, * AND # PLAY THERE DTMF EQUIVALENTS. IN THIS MODE, YOU CAN ALSO DIRECTLY "TALK" (USING A MICROPHONE) WITH THE REMOTE TARGET IF SO DESIRED.
  • IN IAX2 MODE, IF YOUR VOIP PROVIDER SUPPORTS IT, YOU CAN "SET" YOUR CALLER ID NUMBER (CALLER ID SPOOFING).
  • COMES WITH COMPLETE SOURCE CODE AND IS RELEASED UNDER THE GNU GENERAL PUBLIC LICENSE.

SIP TASTIC

http://www.isecpartners.com/sip_tastic.html

SIP.TASTIC IS A PASSIVE DICTIONARY ATTACK TOOL ON SIP'S DIGEST AUTHENTICATION METHOD. THE PROGRAM IS WRITTEN PRIMARILY TO TEST VOIP NETWORKS THAT USE SIP FOR SESSION SETUP. THE PROOF OF CONCEPT TOOL SHOWS HOW THE DIGEST AUTHENTICATION PROCESS USED BY SIP ENDPOINTS IS VULNERABLE TO AN OFFLINE BRUTE-FORCE ATTACK. THIS ATTACK ALLOWS MALICIOUS USERS TO STEAL PASSWORDS AND HIJACK ENDPOINT IDENTITIES.

RTPINJECT

http://www.isecpartners.com/rtpinject.html

RTPINJECT IS A MINIMAL-SETUP PREREQUISITES ATTACK TOOL THAT INJECTS ARBITRARY AUDIO INTO ESTABLISHED RTP CONNECTIONS. THIS PROGRAM IS WRITTEN PRIMARILY TO DEMONSTRATE THE VULNERABILITY OF THE UNDERLYING MEDIA LAYER FOR VOIP NETWORKS. THE TOOL IDENTIFIES ACTIVE CONVERSATIONS, ENUMERATES THE MEDIA CODEC IN USE, AND ALLOWS FOR THE INJECTION OF AN ARBITRARY AUDIO FILE THAT IS AUTOMATICALLY TRANSCODED INTO THE NECESSARY FORMAT REQUIRED.

H.323 INJECTION FILES

http://www.isecpartners.com/h_323_injection_files.html

H.323 INJECTION FILES CAN BE USED WITH NEMESIS, A PACKET INJECTION TOOL, FOR A VARIETY OF ATTACKS ON H.323 NETWORKS. ATTACKS FILES INCLUDE REPLAY ATTACKS AND DENIAL OF SERVICE.

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License