isip v-0.2 released - Interactive sip toolkit for packet manipulations, sniffing, mitm, fuzzing, simulating of dos attacks.

isip v-0.2 released – Interactive sip toolkit for packet manipulations, sniffing, mitm, fuzzing, simulating of dos attacks.

ISIP is a Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.

Latest version v0.2, Changelog:
* Default message template(only register now)
* Specific show command
* New history menu
* Line parsing changes
* New command: load the pcap file
* New command: save the packets
* New command: parse the text file to packet
* New command: open the packets on wireshark
* Seperate cmd loops
* Fix: root problem
* Change directory structure

isip-v-0-2

isip-v-0-2

Requirements:
– python 2.7.x
– python virtual env

Usage:
+ Packet manipulation tools are in packet cmd loop. First start, you are in the main cmd loop.

+ Create a new sip packet with new command. If you don’t write name, isip create the packet named by message-{id}.

+ List the all created sip packets with list command.

+ Show properties of packets with show command. You can type ip, udp or sip with show command.

+ Set the random properties of packets with set command. You can use with random-headers-from, random-headers-to, random-headers-call-id, random-headers-max-forwards, random-headers-user-agent, random-headers-contact, random-headers-invite-cseq, random-headers-register-cseq commands.

+ Send the packet with send command.

+ Parse the text file to packet with parse command.

+ Load the packets from pcap file with load command. If you don’t write name, isip create the packet named by message-{id}.

+ Save the packets tp pcap file with save command. You can save the packet list just single command.

+ Open the wireshark for packets with wireshark command.

+ List the history with hist command.

Usage:

Source : https://github.com/halitalptekin