rtpBreak – RTP Analysis & Hacking Tool

Your website & network are Hackable


rtpBreak detects, reconstructs and analyzes any RTP [rfc1889] session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protocol. In particular, it doesn’t require the presence of RTCP packets (voipong needs them) that aren’t always transmitted from the recent VoIP clients.

The RTP sessions are composed by an ordered sequence of RTP packets. Those packets transport the Real Time data using the UDP transport protocol.

The RTP packets must respect some well defined rules in order to be considered valid, this characteristic allows to define a pattern on the single packet that is used to discriminate the captured network traffic from packets that can be
RTP and those that securely are not.

You can download rtpBreak here:

rtpbreak-1.0.tgz

Or read more here the English documentation is here.


Posted in: Hacking Tools, Network Hacking

, , , , , , ,

Recent in Hacking Tools:
- Unicorn – PowerShell Downgrade Attack
- Wfuzz – Web Application Brute Forcer
- wildpwn – UNIX Wildcard Attack Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,977,475 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,417,574 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 678,518 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


2 Responses to rtpBreak – RTP Analysis & Hacking Tool

  1. TheRealDonQuixote August 16, 2007 at 9:19 pm #

    Darn, Skype is down till FRIDAY!! Now I have to wait to give this one a whirl. Not that nothing else uses RTP, but VoIP is pretty much based on this protocol with no standard ports.

  2. Alfred Farrington August 17, 2007 at 2:24 pm #

    The software actually works pretty well. Build a simple voip device install softphones on different computers and give it a whirl. Ah another tool for the arsenal. Documentation is old style takes me back to the BB days. Wish they put it in a wiki though,.