 
[ SIPcrack ]


-[ Introduction

SIPcrack is a suite for sniffing and cracking the digest authentification
used in the SIP protocol.

For more details regarding the digest authentication mechanism see:

RFC3261 - SIP: Session Initiation Protocol 
RFC2617 - HTTP Authentication: Basic and Digest Access Authentication


-[ Compile

Just type 'make'.

If you don't have OpenSSL installed or encounter any building problems try
'make no-openssl' to build with integrated MD5 function (which is slower 
than the OpenSSL implementation).


-[ Usage

Use sipdump to dump SIP digest authentications to a file.
If a login is found, the sniffed login is written to the dump file.
See 'sipdump -h' for options.

Use sipcrack to bruteforce the user password using the dump file 
generated by sipdump.
If a password is found, the sniffed login in the dump file is updated
See 'sipcrack -h' for options.

USAGE_EXAMPLES contains some extended usage examples.


-[ Support && Bugs

If you find any SIP logins that sipdump does not detect or sipcrack is
not able to crack please create a packet dump:

e.g. 'tcpdump -s 0 -w packetdump.txt tcp or udp') 

...and send it to mjm'at'codito.de!

NOTE: For this purpose use a wrong password and include it in your
bug report. 


-[ Author

Martin J. Muench

Mail: mjm'at'codito.de
Web:  www.codito.de | www.remote-exploit.org


-[ Thanks

Max Moser
Lucian Hanga
