Sounds like a pun on Sid Vicious.
--
You received this message because you are subscribed to the Google Groups "HackerSpace - Adelaide, South Australia" group.
To view this discussion on the web visit https://groups.google.com/d/msg/hackerspace-adelaide/-/hraWpGVFHwoJ.
To post to this group, send email to hackerspac...@googlegroups.com.
To unsubscribe from this group, send email to hackerspace-adel...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/hackerspace-adelaide?hl=en.
--
Hey,
I thought you might know about this :)Cheers for the reassurance.
Is it weird that Scott and I both were hit on the same night?
On 8 October 2012 09:11, Kapheroph <kap.d...@gmail.com> wrote:
Hey mate,
It's been a while since I've used it in a pen test but it was probably just a random scan. Not really much to worry about unless it becomes a frequent attack.
No doubt you stumbled across the project's landing page:
http://blog.sipvicious.org/
You could check for updates on your device's firmware or tune the network's NIDS/NIPS if you are running such software/hardware on your network, but again I wouldn't worry about it unless the calls are so frequent it results in a denial of service.
Hit me up on chat if you have any further worries.
Cheers.
On 8 October 2012 07:55, Jamie Mackenzie <jrrmac...@gmail.com> wrote:
Hi guys,Does anybody know anything about "sipvicious"?I have a VoIP phone and it rang this morning at 2:40am. The caller id showed up as sipvicious and when the call was answered there was nobody there.I did a little googling and I don't think it's much to worry about, but thought I'd ask here to see if anybody knew anything more about it?
--
You received this message because you are subscribed to the Google Groups "HackerSpace - Adelaide, South Australia" group.
To view this discussion on the web visit https://groups.google.com/d/msg/hackerspace-adelaide/-/hraWpGVFHwoJ.
To post to this group, send email to hackerspac...@googlegroups.com.
To unsubscribe from this group, send email to hackerspace-adelaide+unsub...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/hackerspace-adelaide?hl=en.
--
You received this message because you are subscribed to the Google Groups "HackerSpace - Adelaide, South Australia" group.
To post to this group, send email to hackerspac...@googlegroups.com.
To unsubscribe from this group, send email to hackerspace-adelaide+unsub...@googlegroups.com.
Is it weird that Scott and I both were hit on the same night?Is it weird that Scott and I both were hit on the same night?
Usage: svmap.py [options] host1 host2 hostrange
examples:
svmap.py 10.0.0.1-10.0.0.255 \
> 172.16.131.1 sipvicious.org/22 10.0.1.1/24 \
> 1.1.1.1-20 1.1.2-20.* 4.1.*.*
svmap.py -s session1 --randomize 10.0.0.1/8
svmap.py --resume session1 -v
svmap.py -p5060-5062 10.0.0.3-20 -m INVITE
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-v, --verbose Increase verbosity
-q, --quiet Quiet mode
-s NAME, --save=NAME save the session. Has the benefit of allowing you to
resume a previous scan and allows you to export scans
--resume=NAME resume a previous scan
--randomscan Scan random IP addresses
-i scan1, --input=scan1
Scan IPs which were found in a previous scan. Pass the
session name as the argument
-p PORT, --port=PORT Destination port or port ranges of the SIP device - eg
-p5060,5061,8000-8100
-P PORT, --localport=PORT
Source port for our packets
-x IP, --externalip=IP
IP Address to use as the external ip. Specify this if
you have multiple interfaces or if you are behind NAT
-b BINDINGIP, --bindingip=BINDINGIP
By default we bind to all interfaces. This option
overrides that and binds to the specified ip address
-t SELECTTIME, --timeout=SELECTTIME
Timeout for the select() function. Change this if
you're losing packets
-c, --enablecompact enable compact mode. Makes packets smaller but
possibly less compatable
-m METHOD, --method=METHOD
Specify the request method - by default this is
OPTIONS.
-R, --reportback Send the author an exception traceback. Currently
sends the command line parameters and the traceback
--randomize Randomize scanning instead of scanning consecutive ip
addresses
--