SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against PBX systems especially through identification, scanning, extension enumeration and password cracking.
Command ran to reproduce issue: ['svcrack.py', '-u', '101', '-r1-999', '-t1', '-vv', 'REMOVED', '-R']
Trace:
Traceback (most recent call last):
File "svcrack.py", line 534, in main
sipvicious.start()
File "svcrack.py", line 283, in start
self.getResponse()
File "svcrack.py", line 186, in getResponse
nonce = getNonce(authheader)
File "/root/sipvicious/sipvicious/libs/svhelper.py", line 190, in getNonce
_tmp = re.findall(nonceRE, pkt)
File "/usr/lib/python2.7/re.py", line 181, in findall
return _compile(pattern, flags).findall(string)
TypeError: expected string or buffer
This issue was reported through the
-R
optionCommand ran to reproduce issue:
['svcrack.py', '-u', '101', '-r1-999', '-t1', '-vv', 'REMOVED', '-R']