squid:alerts:et_scan_sipvicious_user-agent_detected_friendly-scanner
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
squid:alerts:et_scan_sipvicious_user-agent_detected_friendly-scanner [2020/04/07 12:15] – created peter | squid:alerts:et_scan_sipvicious_user-agent_detected_friendly-scanner [2021/01/04 20:33] (current) – [Squid - Alerts - ET SCAN Sipvicious User-Agent Detected (friendly-scanner)] peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Squid - Alerts - ET SCAN Sipvicious User-Agent Detected (friendly-scanner) ====== | ====== Squid - Alerts - ET SCAN Sipvicious User-Agent Detected (friendly-scanner) ====== | ||
- | This is a scanner that looks for SIP servers. | + | This is a scanner that looks for [[https:// |
- | SIP Servers are part of your VOIP infrastructure | + | [[https:// |
---- | ---- | ||
Line 20: | Line 20: | ||
An attacker can then begin to enumerate for valid usernames and passwords which if successful, can get access. | An attacker can then begin to enumerate for valid usernames and passwords which if successful, can get access. | ||
- | In addition, these Invites commonly cause what I call “ghost calls” (phones ring from random callers but no one’s home). | + | In addition, these Invites commonly cause “ghost calls” (phones ring from random callers but no one’s home). |
---- | ---- | ||
Line 28: | Line 28: | ||
**SIPVicious** is made up of 4 components – The head, the front legs, the hind legs, and the torso. I’m kidding of course…there’s actually 5.. | **SIPVicious** is made up of 4 components – The head, the front legs, the hind legs, and the torso. I’m kidding of course…there’s actually 5.. | ||
- | **Svcrack** – Used to crack SIP passwords for a given username. Brute force or dict-based. | + | * **Svcrack:** – Used to crack SIP passwords for a given username. |
- | + | | |
- | **Svreport** – Store session info for later use, ie; Cracking a password or reading packets elsewhere. | + | |
- | + | | |
- | **Svmap** – “The annoying one” that does the scanning for open SIP targets – usually with an INVITE or OPTIONS request. | + | |
- | + | * This could potentially be used as a DDoS tool. <code bash> | |
- | **Svwar** – Scans for and enumerates phones on the network. | + | |
- | + | ||
- | It probes for phones by sending packets out and listens for a response, same as above but it seems there’s more manipulation that can be done in terms of what the packets are and what size. This could potentially be used as a DDoS tool. | + | |
- | + | ||
- | <code bash> | + | |
svmap 192.168.1.0/ | svmap 192.168.1.0/ | ||
INFO: | INFO: | ||
Line 46: | Line 41: | ||
INFO: | INFO: | ||
</ | </ | ||
- | + | * **Svcrash** – Defend and Counter-attack tool against ..itself. | |
- | + | | |
- | **Svcrash** – Defend and Counter-attack tool against ..itself. | + | * Manual entries can also be set and optional Brute force on the destination port! |
- | + | ||
- | This tool can be setup to read the asterisk log and automatically obtain a would be attackers IP and Port, attempting to shut down his agent with a malformed response packet | + | |
---- | ---- |
squid/alerts/et_scan_sipvicious_user-agent_detected_friendly-scanner.1586261707.txt.gz · Last modified: 2020/07/15 09:30 (external edit)