Sipp
Sipp
Sipp
net
Sipp cheatsheet
Sipp is a free test tool and traffic generator for the SIP protocol. It uses XML format files to define test scenarios.
ENGLISH VERSION WERSJA POLSKA Sitemap PROJEKTY PROGRAMY NARZDZIA ONLINE INNE Code Snippets Sipp LPT WinXP Avrdude/MinGW Linki Co nowego? Kontakt
-sf filename Load test scenario from specified file. -inf filename Use CSV file to insert data substituted for [field0], [field1], etc into XML scenario. First line of file describes order of inserting field sets (SEQUENTIAL/RANDOM/USE). -sn name Use one of the embedded, predefined scenarios like "uac", "uas". -r rate Scenario execution rate, default value = 10 times per period, default period = 1000 ms. -rp period Scenario execution period [ms], combined with execution rate. Execution rate is combined of rate and period parameters, i.e. if period = 3500 and rate = 7 there will be 7 calls in 3.5 s. -t transport mode Set the transport mode: "u1" - UDP, one socket (default), "un" - UDP, one socket per call, other modes (TCP and with compression) available. -max_socket max Set the limit for simultaneously used sockets (for one socket per call mode). If limit is reached, sockets are reused. -m calls Stop and exit after specified tests count. -s service Set user part of the request URI (default: 'service'). Replaces [service] tag in XML scenario file. -ap pass Set password used for auth challenges (default: 'password'). -l limit Limit simultaneous calls (default: 3 * call_duration (s) * rate). -trace_msg Log sent and received SIP messages (file: scenario_pid_messages.log). -trace_err Log error message to file (like "Discarding message which can't be mapped to a known SIPp call").
Search
SLM, SLA Best Practices Learn SLM, SLA Basics and More. Get a Free Guide Now.
www.ITBusinessEdge.com/SLMGuide
OPTIONS
Send OPTIONS message 5 times to 30@192.168.1.211.
sipp 192.168.1.211 -sf OPTIONS.xml -m 5 -s 30
Send OPTIONS message 30 times to 30@192.168.1.211 waiting 200 ms for 200/OK reply each time.
sipp 192.168.1.211 -sf OPTIONS_recv_200.xml -m 30 -s 30
REGISTER
Register to 192.168.1.106 using parameters from CSV file. If CSV file has more than one entry you can increase simultaneous call limit (-l option).
sipp 192.168.1.106 -sf REGISTER_client.xml -inf REGISTER_client.csv -m 1 -l 1 -trace_msg -trace_err
converted by Web2PDFConvert.com
REGISTER + INVITE
SIPp is simulating 3 UACs, each one of them is making outgoing call. This scenario expects calls to be answered. Call targets are 3 other UACs configured to auto answer and play wav file (single pjsua instance with 3 accounts).
pjsua_vc6d --local-port=5068 --id sip:33@192.168.1.211 --registrar sip:192.168.1.211 --proxy sip:192.168.1.211 --realm * --username 33 --password 33 --next-account --id sip:34@192.168.1.211 --registrar sip:192.168.1.211 --proxy sip:192.168.1.211 --realm * --username 34 --password 34 --next-account --id sip:35@192.168.1.211 --registrar sip:192.168.1.211 --proxy sip:192.168.1.211 --realm * --username 35 --password 35 --play-file file.wav --auto-answer 200 --auto-play
Each call is disconnected after 30 s. Call limit is this time smaller than number of CSV entries to avoid multiple calls to single target.
sipp 192.168.1.211 -sf REGISTER_INVITE_client.xml -inf REGISTER_INVITE_client.csv -m 100 -l 2 -r 1 -rp 10000
converted by Web2PDFConvert.com
SIP digest leak is a SIP phone vulnerability that allows attacker to get digest response from a phone and use it to guess password using brute-force method described first on enablesecurity.com page. Here are required steps: 1. 2. 3. 4. 5. 6. attacker calls phone (direct IP call) sending INVITE frame, callee picks up phone, connection is confirmed by both sites, attacker does not send any RTP frames (at least does not have to) and just waits, callee hangs up phone sending BYE request (probably throwing some profanities), in response to BYE attacker sends SIP/401 or 407 message (authentification request), if attack is successfull callee is sending BYE again with Authorization: Digest header added.
At this point attacker has authentification challenge (sent by him with 401/407 message) and response (received with last BYE). Most likely there will be simplest SIP/2.0 authentification scheme used (RFC2069):
ha1 = MD5(username ":" realm ":" password) ha2 = MD5(method ":" req_uri) response = MD5(ha1 ":" nonce ":" ha2)
Assuming that username and realm are known attacker can now use brute-force method to guess user password. There are few conditions that have to be met to make this scheme work: SIP phone has to respond to authentication challenges sent by other sources than registration server(s) it is using (as a note it works with one hardware phone and one softphone I've tested (and those were all user agents I've tested)), phone SIP port has to accessible to attacker, usally phone will be placed behind the Restricted Cone NAT and port would not be forwarded, attacker would most likely have to know username and authentication realm used by target; for better security you probably should not leave "realm" configuration field of SIP phone empty (it could respond to challenges with any realm then making it easier to prepare attack), guessing password through brute-fource would be time consuming or almost impossible for more complex passwords.
sipp 192.168.1.211 -sf uac_digest_leak.xml -s 30 -m 1
Asterisk FreePBX Hosting Fully featured and private PBX ultra high speed connection vps.powerpbx.org Force Calibration Device Calibrate load with this new device 15% discount on online orders! www.engineeringhelper.com OnSIP Hosted PBX The complete phone system replacement and so much more! www.onsip.com
converted by Web2PDFConvert.com