Password Attacksiaxusernameenumerationbruteforceasteriskvoip

enumIAX

enumIAX is an Inter Asterisk Exchange (IAX) protocol username brute-force enumerator that supports dictionary attacks and sequential username guessing against target hosts.

Description

enumIAX is designed for enumerating valid usernames on IAX protocol services, commonly used in Asterisk PBX systems. It operates in two modes: sequential username guessing based on length parameters or dictionary-based attacks using wordlists. This tool is particularly useful for penetration testers assessing the security of VoIP infrastructure by identifying valid user accounts.

The tool targets the IAX protocol, which is a native communication protocol for Asterisk servers. By sending authentication requests with different usernames, enumIAX can determine which accounts exist on the target system. This information gathering technique helps identify potential attack vectors before attempting password brute-forcing.

Use cases include VoIP security assessments, PBX penetration testing, and reconnaissance of Asterisk-based telephony systems. The tool supports session persistence and rate limiting to manage long-running enumeration tasks effectively.

How It Works

enumIAX sends IAX protocol authentication requests to the target host using either sequentially generated usernames within specified length ranges or usernames from a provided dictionary file. The tool analyzes protocol responses to distinguish between valid and invalid usernames. It supports auto-save functionality with configurable intervals, rate limiting to avoid overwhelming the target, and multiple verbosity levels for monitoring progress. Session state can be saved and resumed for interrupted enumerations.

Installation

bash
sudo apt install enumiax

Flags

-d <dict>Dictionary attack using <dict> file
-i <count>Interval for auto-save (# of operations, default 1000)
-m #Minimum username length (in characters)
-M #Maximum username length (in characters)
-r #Rate-limit calls (in microseconds)
-s <file>Read session state from state file
-vIncrease verbosity (repeat for additional verbosity)

Examples

Run a dictionary attack against the target host 192.168.1.1 using the specified wordlist
enumiax -d /usr/share/wordlists/metasploit/unix_users.txt 192.168.1.1
Run default sequential username enumeration against target host
enumiax 192.168.1.1
Sequential guessing of usernames between 3-8 characters against target
enumiax -m 3 -M 8 192.168.1.1
Dictionary attack with increased verbosity
enumiax -d users.txt -v 192.168.1.1
Enumeration with rate limiting and frequent auto-save intervals
enumiax -r 1000 -i 500 192.168.1.1
Resume enumeration from saved session state
enumiax -s session.state 192.168.1.1
High verbosity dictionary attack using rockyou wordlist
enumiax -d /usr/share/wordlists/rockyou.txt -vvv 192.168.1.1
Updated 2026-04-16kali.org ↗