In the first case, the provided pcap file will be parsed looking for SIP authentication sessions which are correctly registered to the SIP registrar server. In the second case, the user must provide SIP authentication fields manually using the command-line. This feature is useful when it is needed to perform specific tests. The tool's main goal is to perform an optimized offline SIP authentication cracking which means there is no need to perform any network traffic. With the proposed approach it is possible to bypass firewall or IDS/IPS protection since it is only needed a passive traffic dump in order to retrieve the SIP authentication handshake.
Offline SIP Cracker is written in pure C language and it is optimized to compute MD5 digests using native EVP functions provided by OpenSSL library. In order to manage, parse and filter network traffic dumps, the application uses the PCAP library.Software depends on following libraries:
OpenSSL library to compute MD5 digests.
PCAP library to parse and filter pcap files.
Developed by Alessandro Di Pinto