Sniffing & Spoofingsipvoiptestingtraceroutefloodusrloc

sipsak

sipsak is a small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications. It can be used for simple tests on SIP applications and devices.

Description

sipsak is a SIP Swiss army knife, providing a compact utility for various tests on SIP servers and user agents. It supports multiple testing modes including shooting SIP messages, tracing routes, querying user location, sending messages, flooding, and random testing. This tool is particularly useful for developers and administrators managing SIP-based systems like VoIP setups.

Use cases include basic diagnostics on SIP endpoints, route discovery, and load testing through flooding or random message generation. The tool's versatility makes it suitable for quick checks without needing more complex SIP testing suites.

It operates via command line with specific modes activated by flags, all targeting a SIP URI destination.

How It Works

sipsak sends crafted SIP messages to specified URIs (sip:[user@]servername[:port]) and processes responses. Modes like shoot (-s) transmit messages from files or defaults, trace (-T) performs SIP traceroute by incrementing TTL, usrloc (-U, -I, -M) queries location services with parameters for bindings and contacts, message (-M) injects custom strings, flood (-F) generates high-volume requests, and random (-R) sends variable messages. Additional parameters control authentication, ports, verbosity, and message formatting across all modes.

Installation

bash
sudo apt install sipsak

Flags

--helpdisplays this help message
--versionprints version string only
--filename=FILEthe file which contains the SIP message to send, use - for standard input
--no-crlfde-activate CR (\r) insertion
--sip-uri=SIPURIthe destination server URI in form sip:[user@]servername[:port]
--tracerouteactivates the traceroute mode

Examples

shoot mode: sends SIP message to target URI
sipsak [-f FILE] [-L] -s SIPURI
trace mode: performs SIP traceroute to target URI
sipsak -T -s SIPURI
usrloc mode: queries user location with various parameters
sipsak -U [-I|M] [-b NUMBER] [-e NUMBER] [-x NUMBER] [-z NUMBER] -s SIPURI
usrloc mode: alternative invocation for location query
sipsak -I|M [-b NUMBER] [-e NUMBER] -s SIPURI
usrloc mode: queries with contact URI and count parameters
sipsak -U [-C SIPURI] [-x NUMBER] -s SIPURI
message mode: sends custom SIP message to target
sipsak -M [-B STRING] [-O STRING] [-c SIPURI] -s SIPURI
flood mode: sends multiple requests to target URI
sipsak -F [-e NUMBER] -s SIPURI
random mode: sends random messages to target URI
sipsak -R [-t NUMBER] -s SIPURI
Updated 2026-04-16kali.org ↗