Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

SIPGREP: Display and Troubleshoot SIP signaling over IP networks in console

License

NotificationsYou must be signed in to change notification settings

sipcapture/sipgrep

Repository files navigation

Build Status

SipGrep 2

Sipgrep is a powerful pcap-aware tool command line tool to sniff, capture, display and troubleshoot SIP signaling over IP networks, allowing the user to specify extended regular expressions matching against SIP headers.

The first version of this program (dated 2005) was a small wrapper for ngrep. Version 2.x provides a full standalone application with numerous additional features geared towards SIP, building upon the excellent ngrep code baseline.

Requirements:

  • libpcap
  • libpcre

On Debian/Ubuntu:sudo apt-get install libpcap-dev libpcre2-dev

On CentOS/RHEL:yum install libpcap-devel pcre-devel

Installation

Debian

Sipgrep is available asDebian package (Thanks @linuxmaniac)

Clone from GIT:

cd /usr/srcgit clone https://github.com/sipcapture/sipgrep.git

Build and Install:

cd sipgrep./build.sh (optional)./configuremake && make install

Usage:

./sipgrep  -Vsipgrep: V2.01b./sipgrep -husage: sipgrep <-ahNViwgGJpevxlDTRMmqCJjxK> <-IO pcap_dump> <-n num> <-d dev> <-A num>             <-s snaplen> <-S limitlen> <-c contact user> <-j user agent>                 <-f from user>  <-t to user> <-H capture url> <-q autostop cond.>                 <-Q split cond.> <-P portrange> <-F file> <-z duration>                 <match expression> <bpf filter>   -h  is help/usage   -V  is version information   -e  is show empty packets   -i  is ignore case   -x  is disable bad parsing notification   -v  is invert match   -R  is don't do privilege revocation logic   -w  is word-regex (expression must match as a word)   -p  is don't go into promiscuous mode   -l  is make stdout line buffered   -D  is replay pcap_dumps with their recorded time intervals   -T  is print delta timestamp every time a packet is matched   -m  is don't do dialog match   -M  is don't do multi-line match (do single-line match instead)   -I  is read packet stream from pcap format file pcap_dump   -O  is dump matched packets in pcap format to pcap_dump   -n  is look at only num packets   -A  is dump num packets after a match   -s  is set the bpf caplen   -S  is set the limitlen on matched packets   -C  is no colors in stdout   -c  is search user in Contact: header   -f  is search user in From: header   -t  is search user in To: header   -F  is read the bpf filter from the specified file   -H  is homer sipcapture URL (i.e. udp:10.0.0.1:9061)   -N  is show sub protocol number   -g  is disabled clean up dialogs during trace   -G  is print dialog report during clean up   -J  is kill friendly scanner automatically   -j  is kill friendly scanner automatically matching user agent string   -K  is kill friendly scanner providing IP and port/portrange i.e.: 10.0.0.1:5060-5090   -q  is auto stop condition:        duration:NUM - stop after NUM seconds        filesize:NUM - stop this file after NUM KB   -Q  is pcap_dump split condition:        duration:NUM - switch to next file after NUM secs        filesize:NUM - switch to next file after NUM KB   -a  is disable packet re-assemblation   -P  is use specified portrange instead of default 5060-5061   -d  is use specified device instead of the pcap default   -z  is make statistics count maximum <duration> seconds

Examples:

#Find a dialog there From user contains '2323232'sipgrep -f 2323232#Find a dialog there To user contains '1111' and print dialog reportsipgrep -f 1111 -G#Display only 603 replies without dialog matchsipgrep '^SIP/2.0 603' -m#Display only OPTIONS and NOTIFY requestssipgrep '^(OPTIONS|NOTIFY)'#Display only SUBSCRIBE dialogsipgrep 'CSeq:\s?\d* (SUBSCRIBE|PUBLISH|NOTIFY)' -M#Kill friendly-scannersipgrep -J#Kill friendly-scanner with custom UACsipgrep -j sipvicious#Display dialogs and duplicate all traffic to HOMER sipcapture in HEPv3sipgrep -f 23333 -H udp:10.0.0.1:9061#collect all Calls/Regisrations untill pcap_dump smaller than 20 KB.sipgrep -q 'filesize:20' -O sipgrep.pcap#collect all Calls/Regisrations dialogs during 120 seconds, print reports and exit.sipgrep -g -G -q 'duration:120'#split pcap_dump to 20 KB files in sipgrep_INDEX_YYYYMMDDHHMM.pcapsipgrep -Q 'filesize:20' -O sipgrep.pcap#split pcap_dump in sipgrep_INDEX_YYYYMMDDHHMM.pcap each 120 secondssipgrep -Q 'duration:120' -O sipgrep.pcap

Reports

-----------------------------------------------Dialog finished: [53342c3b200e-hgf9cyc7r0i2]Type: CallFrom: "From Work with Love" <sip:107@sip.xxx.com>;tag=fucueumi19To: <sip:101@sip.xxx.com;user=phone>UAC: snom360/8.7.3.25CDR init ts: 1395928127CDR ringing ts: 1395928128SRD(PDD): 1 secCDR answer ts: 1395928136WTA: 9 secCDT (duration): 70 secCDR termination ts: 1395928206Was connected: YESREASON: BYE----------------------------------------------------------------------------------------------Dialog finished: [552E1549D6A9E0F3@192.168.178.1]Type: RegistrationFrom: <sip:102@sip.xxx.com>;tag=3598882807To: <sip:102@sip.xxxx.com>UAC: AVM FRITZ!Box Fon WLAN 7170 Annex A 58.04.67 (Dec 18 2008)CDR init ts: 1395928251CDR termination ts: 1395928251SDT: 0 secWas registered: YESREASON: 200----------------------------------------------------------------------------------------------Dialog finished: [2d714880c68a824dae62049eecc91599]Type: CallFrom: 7001<sip:7001@xxxxxxx>;tag=1244ddd6To: 448455915802<sip:448455915802@xxxxxxx>UAC: sipcli/v1.8CDR init ts: 1395928246SDT: 8 secCDR termination ts: 1395928254Was connected: NOREASON: 407-----------------------------------------------

Colorful SIP Output:

Screenshot

License

Copyright (c) 2014-2016 Alexandr Dubovikov

sipgrep is released under GNU GPL v3. SeeCOPYING for details.


[8]ページ先頭

©2009-2025 Movatter.jp