SIP-DAS is a tool developed to simulate SIP-based DoS attacks.

SIP-DAS is a tool developed to simulate SIP-based DoS attacks.

SIP-DAS (DoS Attack Simulator) is a tool developed to simulate SIP-based DoS attacks. It has been developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense approaches in original.

SIP-DAS was originally written in Java, but it has been rewritten using Python, so that various advantageous libraries can be used.

Dependencies:
+ Python 2.7.x
+ python-scapy, netifaces, ipaddress, figlet & toilet

SIP-DAS is a tool developed to simulate SIP-based DoS attacks.

SIP-DAS comprises four main components: spoofed IP address generator, SIP message generator, message sender and scenario player. It needs outputs of SIP-NES (Network Scanner) and SIP-ENUM (Enumerator) along with some pre-defined files. SIP-DAS also provides a framework for SIP-ASP (Attack Scenario Player).

SIP-NES needs to enter the IP range or IP subnet information. It sends SIP OPTIONS message to each IP addresses in the subnet and according to the responses cevaplara göre outputs the potential SIP clients and servers on that subnet.

SIP-ENUM outputs which SIP users are valid according to the responses in that network by sending REGISTER messages to each client IP addresses on the output of SIP-NES.

Usage:

Source: https://github.com/meliht