Skip to content

Conversation

carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL:
  • Blog Title: Research Update: Enhanced src/network-services-pentesting/pentesting-voip/basic-voip-protocols/sip-session-initiation-protocol.md
  • Suggested Section: Research

🎯 Content Summary

Research Update for src/network-services-pentesting/pentesting-voip/basic-voip-protocols/sip-session-initiation-protocol.md

This PR contains automated research updates including:

  • Latest security vulnerabilities and attack vectors
  • Updated techniques and tools
  • Enhanced explanations and examples
  • Additional references and resources

Generated by: HackTricks Research Agent
Timestamp: 2025-09-08 01:33:23 UTC

This update was generated through automated security research to kee...

🔧 Technical Details

Research update for HackTricks content

🤖 Agent Actions

I’ve read the existing SIP page and the related VoIP content and updated the SIP page to add practical, protocol-focused security content without duplicating the broader attacks that already exist in the main VoIP page.

What I changed and added

  • Fixed small inaccuracies/typos in the INVITE/SDP example (corrected a=rtpmap line) and REGISTER section (formatting and “Authorization” spelling).
  • Added “SIP Security and Pentesting Notes” section with:
    • Fingerprinting and discovery using OPTIONS (including a raw netcat probe and an nmap example).
    • Enumeration behavior notes and hardening tip for Asterisk (alwaysauthreject for chan_sip; notes for PJSIP).
    • Modern digest algorithms note (MD5, MD5-sess, SHA-256, SHA-512/256 per RFC 8760) and an actionable offline-cracking example using hashcat mode 11400 with the expected hash format and command. citeturn0search10turn0search7
    • SIP over TLS (sips) and SIP over WebSockets (RFC 7118) quick notes and what to test. citeturn0search8
    • DoS quick checks with a concrete iptables hashlimit rate-limiting example for UDP/5060.
    • “Recent, relevant CVE” note on Asterisk PJSIP CVE‑2024‑35190 with fixed versions to watch for during assessments. citeturn0search3
    • Focused hardening checklist (TLS/SRTP, digest algo policy, Asterisk-specific flags, topology hiding, disable unused methods/rate limits).
  • Cross-linked to the main VoIP page to avoid duplicating enumeration/attacks already covered there using the HackTricks internal reference block.
  • Added a concise References section (kept to 2 items as requested).

Files modified

  • src/network-services-pentesting/pentesting-voip/basic-voip-protocols/sip-session-initiation-protocol.md

Key sources used

  • RFC 8760 (digest with SHA-256/SHA-512/256). citeturn0search7
  • Asterisk GHSA advisory for CVE‑2024‑35190. citeturn0search3
  • Hashcat wiki (mode 11400 SIP digest auth, MD5). citeturn0search9
  • RFC 7118 (SIP over WebSocket). citeturn0search8

If you want me to also add a short subsection showing how to craft/modify SIP over WebSocket probes or to include an NSE example for sip-enum-users/sip-brute, I can extend the page further while keeping it non-duplicative.


This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

📚 Repository Maintenance

  • MD files processed: 874
  • MD files fixed: 1

All .md files have been checked for proper formatting (headers, includes, etc.).

🗑️ File Cleanup

  • searchindex.js removed: This auto-generated file has been removed to prevent conflicts.

Build master and others added 2 commits September 8, 2025 00:12
@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post:

Content Categories: Based on the analysis, this content was categorized under "Research".

Repository Maintenance:

  • MD Files Formatting: 874 files processed (1 files fixed)

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@github-actions github-actions bot force-pushed the master branch 4 times, most recently from 4b54ccf to 74cc86a Compare September 8, 2025 06:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant