03 June 2008 | 5,310 views

Sipflanker – Locate SIP (VoIP) Device Web Interfaces

Prevent Network Security Leaks with Acunetix

SIP devices are getting to be very common now, especially with open source bundled OS offerings like Trixbox making it easy to setup your own digital or IP-PBX.

Along with the frequent installations, many (if not most) VoIP devices have available a Web GUI for their configuration, management, and report generation. These Web GUIs are often on default, meaning that the moment you install the IP phone or IP PBX, the Web GUI is immediately available on the network. And unfortunately it is also common for the username and password to have default values.

Sipflanker will help you find these SIP devices with potentially vulnerable Web GUIs in your network.

What the application does is search the range of IPs you specify, and checks if port 5060 is available. Whether open or close, port usually 5060 indicates the presence of a SIP device. Then it checks if port 80 (http) is open. The combination of an open port 80, together with port 5060, either open or closed, signals a probable SIP device with a Web GUI.

Sipflanker then proceeds to extract the website, and fingerprint the device. You can find default passwords for IP phones here.

You can download sipflanker here:

sipflanker1.5beta.zip

Or read more here.



Recent in Hacking Tools:
- Garmr – Automate Web Application Security Tests
- ParanoiDF – PDF Analysis & Password Cracking Tool
- XSSYA – Cross Site Scripting (XSS) Scanner Tool

Related Posts:
- VoIP Security Testing Tools List from VoIPSA
- VoIP Hopper – VLAN Hopping Tool
- UCSniff 3.0 Released – VoIP/IP Video Sniffing Tool

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,863,597 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,052,458 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 622,415 views

Advertise on Darknet

One Response to “Sipflanker – Locate SIP (VoIP) Device Web Interfaces”

  1. Jinesh Doshi 5 June 2008 at 8:04 am Permalink

    Got to be careful from now onwards when using VoIP devices in office.