.TH SVMAP.PY "1" "June 2020" "svmap.py v0.3.4" "User Commands"
.SH NAME
svmap.py \- manual page for svmap.py v0.3.4
.SH SYNOPSIS
.B svmap.py
[\fIoptions\fR] \fIhost1 host2 hostrange\fR
.SH DESCRIPTION
Scans for SIP devices on a given network
.PP

examples:
.PP

svmap.py 10.0.0.1\-10.0.0.255 172.16.131.1 sipvicious.org/22 10.0.1.1/241.1.1.1\-20 1.1.2\-20.* 4.1.*.*
.PP

svmap.py \fB\-s\fR session1 \fB\-\-randomize\fR 10.0.0.1/8
.PP

svmap.py \fB\-\-resume\fR session1 \fB\-v\fR
.PP

svmap.py \fB\-p5060\-5062\fR 10.0.0.3\-20 \fB\-m\fR INVITE
.PP

.SH OPTIONS
.TP
\fB\-\-version\fR
show program's version number and exit
.TP
\fB\-h\fR, \fB\-\-help\fR
show this help message and exit
.TP
\fB\-v\fR, \fB\-\-verbose\fR
Increase verbosity
.TP
\fB\-q\fR, \fB\-\-quiet\fR
Quiet mode
.TP
\fB\-p\fR PORT, \fB\-\-port\fR=\fIPORT\fR
Destination port or port ranges of the SIP device \- eg
\fB\-p5060\fR,5061,8000\-8100
.TP
\fB\-P\fR PORT, \fB\-\-localport\fR=\fIPORT\fR
Source port for our packets
.TP
\fB\-x\fR IP, \fB\-\-externalip\fR=\fIIP\fR
IP Address to use as the external ip. Specify this if
you have multiple interfaces or if you are behind NAT
.TP
\fB\-b\fR BINDINGIP, \fB\-\-bindingip\fR=\fIBINDINGIP\fR
By default we bind to all interfaces. This option
overrides that and binds to the specified ip address
.TP
\fB\-t\fR SELECTTIME, \fB\-\-timeout\fR=\fISELECTTIME\fR
This option allows you to trottle the speed at which
packets are sent. Change this if you're losing
packets. For example try 0.5.
.TP
\fB\-R\fR, \fB\-\-reportback\fR
Send the author an exception traceback. Currently
sends the command line parameters and the traceback
.TP
\fB\-A\fR, \fB\-\-autogetip\fR
Automatically get the current IP address. This is
useful when you are not getting any responses back due
to SIPVicious not resolving your local IP.
.TP
\fB\-s\fR NAME, \fB\-\-save\fR=\fINAME\fR
save the session. Has the benefit of allowing you to
resume a previous scan and allows you to export scans
.TP
\fB\-\-resume\fR=\fINAME\fR
resume a previous scan
.TP
\fB\-c\fR, \fB\-\-enablecompact\fR
enable compact mode. Makes packets smaller but
possibly less compatible
.TP
\fB\-\-randomscan\fR
Scan random IP addresses
.TP
\fB\-i\fR scan1, \fB\-\-input\fR=\fIscan1\fR
Scan IPs which were found in a previous scan. Pass the
session name as the argument
.TP
\fB\-I\fR scan1, \fB\-\-inputtext\fR=\fIscan1\fR
Scan IPs from a text file \- use the same syntax as
command line but with new lines instead of commas.
Pass the file name as the argument
.TP
\fB\-m\fR METHOD, \fB\-\-method\fR=\fIMETHOD\fR
Specify the request method \- by default this is
OPTIONS.
.TP
\fB\-d\fR, \fB\-\-debug\fR
Print SIP messages received
.TP
\fB\-\-first\fR=\fIFIRST\fR
Only send the first given number of messages (i.e.
usually used to scan only X IPs)
.TP
\fB\-e\fR EXTENSION, \fB\-\-extension\fR=\fIEXTENSION\fR
Specify an extension \- by default this is not set
.TP
\fB\-\-randomize\fR
Randomize scanning instead of scanning consecutive ip
addresses
.TP
\fB\-\-srv\fR
Scan the SRV records for SIP on the destination domain
name.The targets have to be domain names \- example.org
domain1.com
.TP
\fB\-\-fromname\fR=\fIFROMNAME\fR
Specify a name for the from header in requests
.TP
\fB\-6\fR, \fB\-\-ipv6\fR
Scan an IPv6 address
.IP
SIPvicious SIP scanner searches for SIP devices on a given network.

Copyright (C) 2021 Sandro Gauci <sandro@enablesecurity.com>
.IP
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
.IP
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.
.IP
You should have received a copy of the GNU General Public License
along with this program.  If not, see <http://www.gnu.org/licenses/>.
.SH "SEE ALSO"
The full documentation for
.B svmap.py
can be found on GitHub at <https://github.com/enablesecurity/sipvicious/wiki>.