VoIPShark: Open Source VoIP Analysis Platform
VoIPshark is an open source platform for VoIP analysis. It is created as a collection of Wireshark plugins. After installation, it will be available within Wireshark. This platform was created while working on “VoIP Traffic Analysis” course. Those interested can check the course here
VoIPShark will enable the user to do the following:
- Perform macro analysis on VoIP traffic
- Decrypt live or stored VoIP traffic while preserving packet structure and time information
- Export VoIP audio streams to popular media formats
Detect the following threats/attacks
- Message flood
- Invite flood
- SIP MiTM attack
- Attack tool detection
Step 1: Install library
For Linux and MacOS:
Create directory “/usr/local/lib/lua/5.2/” if it does not exist
mkdir -p /usr/local/lib/lua/5.2/
Download VoIPShark and copy lockbox folder to “/usr/local/lib/lua/5.2/” directory
git clone https://github.com/pentesteracademy/voipshark.git mv voipshark/lockbox /usr/local/lib/lua/5.2/
Download VoIPShark and copy lockbox folder to wireshark program directory.
To find out the location of wireshark program directory, check
Help > About Wireshark > Folders (highlighted in green)
Step 2: Installing VoIPShark
- Copy the “plugins” directory to Wireshark personal plugins directory.
- Start wireshark. :)
One can get the location of wireshark plugins directory by checking
Help > About Wireshark > Folders (highlighted in yellow)
Tool featured at
- Nishant Sharma, R & D Manager, Pentester Academy firstname.lastname@example.org
- Ashish Bhangale, Sr. Security Researcher, Pentester Academy email@example.com
- Jeswin Mathai, Security Researcher, Pentester Academy firstname.lastname@example.org
Under the guidance of Mr. Vivek Ramachandran, CEO, Pentester Academy
Decrypting SRTP: SRTP Packets
Decrypting SRTP: Enabling Auto Decryption
Decrypting SRTP: Decrypted SRTP (RTP)
Exporting Call Audio: Exported Streams
SIP Information Gathering : SIP Auth Export
SIP Information Gathering : DTMF
VoIP Attack Detection: Bruteforce
VoIP Attack Detection: Unauthenticated Users
This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License v2 as published by the Free Software Foundation.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.