{"id":21573702,"url":"https://github.com/syss-research/wirebug","last_synced_at":"2025-08-21T15:32:14.999Z","repository":{"id":54377532,"uuid":"268509139","full_name":"SySS-Research/WireBug","owner":"SySS-Research","description":"WireBug is a toolset for Voice-over-IP penetration testing","archived":false,"fork":false,"pushed_at":"2022-03-30T12:12:07.000Z","size":3955,"stargazers_count":169,"open_issues_count":0,"forks_count":33,"subscribers_count":10,"default_branch":"master","last_synced_at":"2024-12-08T03:11:07.833Z","etag":null,"topics":["hacking","man-in-the-middle","pentest","rtp","security","security-testing","sip","sips","srtp","unified-communications","vlan","voip"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/SySS-Research.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-06-01T11:56:49.000Z","updated_at":"2024-12-04T10:12:34.000Z","dependencies_parsed_at":"2022-08-13T13:50:37.812Z","dependency_job_id":null,"html_url":"https://github.com/SySS-Research/WireBug","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SySS-Research%2FWireBug","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SySS-Research%2FWireBug/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SySS-Research%2FWireBug/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SySS-Research%2FWireBug/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/SySS-Research","download_url":"https://codeload.github.com/SySS-Research/WireBug/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":230520392,"owners_count":18238948,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["hacking","man-in-the-middle","pentest","rtp","security","security-testing","sip","sips","srtp","unified-communications","vlan","voip"],"created_at":"2024-11-24T12:07:45.447Z","updated_at":"2024-12-20T01:15:29.397Z","avatar_url":"https://github.com/SySS-Research.png","language":"Python","readme":"# WireBug\n\nWireBug is a tool set for Voice-over-IP penetration testing. \nIt is designed as a wizard which makes it easy to use. The tools are build for single using too, so every tool is its own python or bash program.\n\n## Installation\n\nRead the Installation Guide in the [wiki](https://github.com/SySS-Research/WireBug/wiki/Installation-Guide).\n\n## Tools\n\n- FullBridge: This is a simple bash script to set up a layer2 bridge with two defined interfaces.\n\n- TimeShift: Tool for response to a NTP request in a man-in-the-middle position (also with FullBridge) with a timestamp in the past or future. You can easily check if the client (VoIP Phone) checks the validity of the server certificate (SIPS, H.323s, HTTPS, LDAPS etc.), or simply use it as a DOS Tool.  \n\n- VlanEnum: This bash script creates 802.1Q virtual interfaces with VLAN tagging and waiting for possible DHCP responses. If it was possible to get an IP Address the interface will be staid alive otherwise it will be deleted. \n\n- SaCLaC: This includes two python programs. One for spoofing fake LLDP-MED packets to getting into VoIP VLAN or trigger a DoS by instruct the client to set a VLAN-Tag and one to analyze CDP Information of a PCAP File. \n\n- DecryptSRTP: This script makes it easy to use the [Cisco Systems' SRTP library](https://github.com/cisco/libsrtp) for decrypting a SRTP-SDES Stream if the AES-Key was extracted from the signalling part.\n\n- CrackTheSIP: A simple brute force tool for cracking SIP digest authentication by using a word list.  \n\n- ZRTPDowngrade: A Tool to drop ZRTP initiated Packets in a man-in-the-middle position.\n\n- EvilSTUN: A simple tool for fake STUN responses.\n\n- SIPFuzz: A tool for SIP fuzzing.\n\n- SIPEnum: This tool enumerates SIP extensions by a given file.\n\n- SIPBrute: A tool for online brute force attacks against SIP proxies.\n\n- SIPDiscover: A tool to discover SIP services.\n\n- RTPFuzz: A tool for fuzzing an injecting random RTP packets (noise) into running streams. \n\n- RTPAudioInjection: A tool for injecting a raw audio file into running streams. \n\n\n## Usage\n\nRead the [wiki pages](https://github.com/SySS-Research/WireBug/wiki) for more information.\n\n### Wizard\nThe goal of the WireBug tool set is the wizard with tab-completion. This makes it easy to use without knowledge of detailed information about the tool or options.\nAdditionally, you can use any tool from the command line.\n\n#### Start the Wizard\n```\npython wirebug.py\n```\n\n#### Output\n```bash\n\n     __      __.__              __________              \n    /  \\    /  \\__|______   ____\\______   \\__ __  ____  \n    \\   \\/\\/   /  \\_  __ \\_/ __ \\|    |  _/  |  \\/ ___\\ \n\u003e\u003e\u003e\u003e\u003e\\\u003e\u003e\u003e\u003e\u003e\u003e\u003e\u003e/|\u003e\u003e||\u003e\u003e|\u003e\\/\\\u003e\u003e\u003e\u003e\u003e/|\u003e\u003e\u003e\u003e|\u003e\u003e\u003e\\\u003e\u003e|\u003e\u003e/\u003e/\u003e/\u003e\u003e\u003e\u003e\u003e\u003e\u003e\n      \\__/\\  / |__||__|    \\___  .______  /____/\\___  / \n           \\/                  \\/       \\/     /_____/  \n\nby Moritz Abrell - SySS GmbH, 2019 - 2021\n\n\n\nFollow the wizard to use WireBug.\nUse TAB to show possible options.\n\nwizard \u003e \n```\n#### help function\n```\nwizard \u003e help\n\nDocumented commands (type help \u003ctopic\u003e):\n========================================\nbridge       evilstun  lldpspoof       sipcrack     timeshift\ncdpanalyze   exit      rtpaudioinject  sipdiscover  vlanenum\nclear        help      rtpfuzz         sipenum      zrtpdowngrade\ndecryptsrtp  lldpdos   sipbrute        sipfuzz\n```\n\n## Sample Usage Video\n\n[![SySS Tool Tip WireBug](https://img.youtube.com/vi/3vg899vCksQ/0.jpg)](https://www.youtube.com/watch?v=3vg899vCksQ)\n\n## References\n\n* [Hacktivity 2020](https://hacktivity.com/index.php/presentations/)\n* [Standoff 2020](https://standoff365.com/conferences/penetration-testing-communication-systems-nowadays)\n* [SySS Pentest Blog](https://www.syss.de/pentest-blog/2020/penetrationstests-von-voip-und-ucc-das-neue-syss-tool-wirebug)\n\n## Author\nMoritz Abrell, SySS GmbH 2019-2021\n\n## Disclaimer \nUse at your own risk. Do not use without full consent of everyone involved. For educational purposes only.\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsyss-research%2Fwirebug","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsyss-research%2Fwirebug","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsyss-research%2Fwirebug/lists"}