VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties. It incorporates a fuzzing suite built on the Sulley fuzzing framework, a SIP torturer tool based on RFC 4475 and a variety of auxilliary modules to assist in crash detection and debugging.
VoIPER is a cross platform tool, usable via a command-line interface on Linux, Windows and OS X or a GUI on Windows. The primary goal of VoIPER is to create a toolkit with all required testing functionality built in and to minimise the amount of effort an auditor has to put into testing the security of a VoIP code base. This version has been extensively tested against a variety of SIP clients but should also work versus registrars, proxies, gateways and so on.
For the moment the fuzzer incorporates tests for - SIP INVITE (3 different test suites) - SIP ACK - SIP CANCEL - SIP request structure - SDP over SIP This translates to well over 200,000 generated tests covering all SIP attributes specified in RFC 3261 for the given messages.
What is new in this release:
- Added a bundle of new fuzzers
- Rewrote the entire SIP backend
- Added a 'voiper.config' file to allow certain options to be specified to the SIP backend
Requirements:
- Python
Comments not found