rtpbreak包装说明
随着rtpbreak可以检测,重建和分析任何RTP会话。它不需要的RTCP分组的存在,并且独立地工程形成用于信令协议(SIP,H.323,SCCP,...)。输入是数据包的顺序,输出是一组可以作为其他工具的输入使用的文件(Wireshark的/ tshark的,袜中,grep / awk的/剪切/ CAT / sed的,...)。它也支持无线(AP_DLT_IEEE802_11)网络。
- 一个未知或不支持的信令协议重构任何RTP流
- 重建在无线网络中的任何RTP流,而做渠道跳频(VoIP的活动检测器)
- 重建和解码在批处理模式下的任何RTP流(用袜,星号,...)
- 重建所有已经存在的RTP流
- 重新排序任何RTP流以供日后分析的数据包(与tshark的,Wireshark的,...)
- 在一个芯片上的Linux设备建立一个微小的无线VoIP窃听系统
- 构建一个完整的VoIP窃听系统(rtpbreak将只是RTP剥离模块!) 资料来源:rtpbreak文档
- 作者:Dallachiesa米歇尔
许可:GPL第二版
0x01 包含在rtpbreak包工具
rtpbreak - 检测,重建,并分析RTP会话
:~# rtpbreak -h Copyright (c) 2007-2008 Dallachiesa Michele <micheleDOTdallachiesaATposteDOTit> rtpbreak v1.3a is free software, covered by the GNU General Public License. USAGE: rtpbreak (-r|-i) <source> [options] INPUT -r <str> Read packets from pcap file <str> -i <str> Read packets from network interface <str> -L <int> Force datalink header length == <int> bytes OUTPUT -d <str> Set output directory to <str> (def:.) -w Disable RTP raw dumps -W Disable RTP pcap dumps -g Fill gaps in RTP raw dumps (caused by lost packets) -n Dump noise packets -f Disable stdout logging -F Enable syslog logging -v Be verbose SELECT -m Sniff packets in promisc mode -p <str> Add pcap filter <str> -e Expect even destination UDP port -u Expect unprivileged source/destination UDP ports (>1024) -y <int> Expect RTP payload type == <int> -l <int> Expect RTP payload length == <int> bytes -t <float> Set packet timeout to <float> seconds (def:10.00) -T <float> Set pattern timeout to <float> seconds (def:0.25) -P <int> Set pattern packets count to <int> (def:5) EXECUTION -Z <str> Run as user <str> -D Run in background (option -f implicit) MISC -k List known RTP payload types -h This
0x02 rtpbreak用法示例
使用eth0设备 (-i eth0的)分析 RTP流,填补空白 (-g), 嗅探在混杂模式 (-m), 并保存到指定目录 (-d rtplog):
:~# rtpbreak -i eth0 -g -m -d rtplog
+ rtpbreak v1.3a running here!
+ pid: 10951, date/time: 17/05/2014#13:40:02
+ Configuration
+ INPUT
Packet source: iface 'eth0'
Force datalink header length: disabled
+ OUTPUT
Output directory: 'rtplog'
RTP raw dumps: enabled
RTP pcap dumps: enabled
Fill gaps: enabled
Dump noise: disabled
Logfile: 'rtplog/rtp.0.txt'
Logging to stdout: enabled
Logging to syslog: disabled
Be verbose: disabled
+ SELECT
Sniff packets in promisc mode: enabled
Add pcap filter: disabled
Expecting even destination UDP port: disabled
Expecting unprivileged source/destination UDP ports: disabled
Expecting RTP payload type: any
Expecting RTP payload length: any
Packet timeout: 10.00 seconds
Pattern timeout: 0.25 seconds
Pattern packets: 5
+ EXECUTION
Running as user/group: root/root
Running daemonized: disabled
* You can dump stats sending me a SIGUSR2 signal
* Reading packets...
原文来自:https://www.hackfun.org/kali-tools/rtpbreak_zh.html。转载请注明原出处,商用请联系原作者授权。