VoIPShark

VoIPShark: Open Source VoIP Analysis Platform

VoIPshark is an open source platform for VoIP analysis. It is created as a collection of Wireshark plugins. After installation, it will be available within Wireshark. This platform was created while working on “VoIP Traffic Analysis” course. Those interested can check the course here

VoIPShark will enable the user to do the following:

  1. Perform macro analysis on VoIP traffic
  2. Decrypt live or stored VoIP traffic while preserving packet structure and time information
  3. Export VoIP audio streams to popular media formats
  4. Detect the following threats/attacks

    • Message flood
    • Invite flood
    • SIP MiTM attack
    • Teardown
    • Enumeration
    • Attack tool detection

Installation

Step 1: Install library

For Linux and MacOS:

  1. Create directory “/usr/local/lib/lua/5.2/” if it does not exist

    mkdir -p /usr/local/lib/lua/5.2/
    
  2. Download VoIPShark and copy lockbox folder to “/usr/local/lib/lua/5.2/” directory

    git clone https://github.com/pentesteracademy/voipshark.git
    mv voipshark/lockbox /usr/local/lib/lua/5.2/
    

For Windows:

Download VoIPShark and copy lockbox folder to wireshark program directory.

To find out the location of wireshark program directory, check Help > About Wireshark > Folders (highlighted in green)

Step 2: Installing VoIPShark

  1. Copy the “plugins” directory to Wireshark personal plugins directory.
  2. Start wireshark. :)

One can get the location of wireshark plugins directory by checking Help > About Wireshark > Folders (highlighted in yellow)

Sister Project

PA-Toolkit

Author

Under the guidance of Mr. Vivek Ramachandran, CEO, Pentester Academy

Screenshots

Decrypting SRTP: SRTP Packets

Decrypting SRTP: Enabling Auto Decryption

Decrypting SRTP: Decrypted SRTP (RTP)

Exporting Call Audio: Exported Streams

SIP Information Gathering : SIP Auth Export

SIP Information Gathering : DTMF

VoIP Attack Detection: Bruteforce

VoIP Attack Detection: Unauthenticated Users

License

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License v2 as published by the Free Software Foundation.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.



Share this post




About

Welcome to Cyber-Security.tk my personal blog to share my knowledge
Cyber Security, Ethical Hacking, Web & Network Auditing, Reverse Engineering and Cryptography
This website don't use analytics tracking and is ads-free. JavaScript is enabled .


Contact

Contact Form : Connect with Us

    Ricochet : ricochet:3ka6l4q255cakeirgxupsl5i4lw3qpk5gmngtv5amax64hckuovgozyd


2023 © 0x1 | Cyber Security Consulting - Copyright All Rights Reserved