SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against PBX systems especially through identification, scanning, extension enumeration and password cracking.
What steps will reproduce the problem?
1.
2.
3.
What is the expected output? What do you see instead?
What version of the product are you using? On what operating system?
Please provide any additional information below.
Can you please provide me a good compiled brute force dictionary or tell me a
good way of brute forcing through sipvicious, thanks in anticipation
Original issue reported on code.google.com by zoya.was...@googlemail.com on 16 Feb 2015 at 2:27
Original issue reported on code.google.com by
zoya.was...@googlemail.com
on 16 Feb 2015 at 2:27