Sipflanker SIP devices vulnerability scanner v1.5b available

any (if not most) VoIP devices have available a Web GUI for
their configuration, management, and report generation. These Web GUIs are often on default, meaning that the moment you install the IP phone or IP PBX, the Web GUI is immediately available on the network. And unfortunately it is also common for the username and password to have the default values.

Sipflanker will help you find these SIP devices with potentially
vulnerable Web GUIs in your network.

What the application does is search the range of IPs you specify, and
checks if port 5060 is available. Whether open or close, port 5060
indicates the presence of a SIP device. Then it checks if port 80 (http) is
open. The combination of an open port 80, together with port 5060, either
open or closed, signals a SIP device with a Web GUI.

Sipflanker then proceeds to extract the website, and fingerprint the
device. You can find default passwords for IP phones at

Tool Submitted by Sergio Castro (the tool developer)

Post scriptum

Compliance Mandates

  • Vulnerability Scanner :

    PCI DSS 11.2, 6.6, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001-27002 12.6, 15.2.2


Comments

Related Articles

Sipflanker
Telephony Scanner
VoIP
Vulnerability Scanner