inviteflood
inviteflood is a tool for SIP/SDP INVITE message flooding over UDP/IP to target SIP systems. It sends multiple INVITE packets to overwhelm a specified flood target.
Description
inviteflood performs SIP/SDP INVITE message flooding over UDP/IP, designed to flood a target domain and IP address with INVITE messages. It was originally tested on Linux Red Hat Fedora Core 4 but is expected to work on various Linux distributions. The tool is useful for testing the resilience of SIP infrastructure against flood attacks by simulating high volumes of INVITE requests.
Use cases include penetration testing of VoIP systems, assessing denial-of-service vulnerabilities in SIP servers, and evaluating network performance under SIP flood conditions. It requires specification of network interface, target user, domain, flood target IP, and packet count to initiate the attack.
The tool outputs details such as source and destination addresses/ports, targeted user agent, and confirms the number of packets sent.
How It Works
inviteflood sends SIP/SDP INVITE messages over UDP/IP to the specified destination IP and port (default 5060). It uses the provided interface's IP as source (customizable), crafts INVITE packets targeting a user/domain, and floods with the specified number of packets. Optional parameters allow customization of source port (default discard port 9), destination port, sleep intervals between messages, and additional headers like From alias or SNOM line strings.
Installation
sudo apt install invitefloodFlags
Examples
inviteflood eth0 5000 example.local 192.168.1.5 100inviteflood eth0 "" example.local 192.168.1.5 100inviteflood eth0 john.doe enterprise.com 192.168.1.5 50inviteflood eth0 5000 192.168.1.10 192.168.1.5 100 -i 192.168.1.202inviteflood eth0 "1+210-555-1212" example.local 192.168.1.5 100 -S 1234 -D 5060inviteflood eth0 5000 example.local 192.168.1.5 100 -a jane.doe -vinviteflood eth0 john.doe enterprise.com 192.168.1.5 200 -s 1000