The Simple SIP Honeypot Server is an easy-to-use script created for cybersecurity practitioners and enthusiasts. Using Python and the Twisted framework, this script sets up a low-interaction Session Initiation Protocol (SIP) server to log SIP requests, acting as a vital tool for basic VoIP traffic analysis and early detection of potential threats in SIP-based communication systems.
- Low-Interaction Honeypot: Designed to mimic SIP services and capture SIP request details with minimal risk.
- Customizable Server Settings: Command-line arguments allow for easy configuration of host and port settings.
- Detailed Logging: Each SIP request is logged, providing insights for security analysis.
- Real-time Interaction: Responds to SIP requests, simulating a live SIP server environment.
- Educational Tool: An excellent resource for learning about SIP vulnerabilities and SIP-based attacks.
- Python 3.x
- Twisted Python library
To install and run the SIP honeypot server, follow these steps:
git clone https://github.com/0xNslabs/sip-honeypot.git
cd sip-honeypot
pip install twisted
Execute the script with optional arguments for host and port. Defaults to 0.0.0.0 (all interfaces) and port 5060.
python3 sip.py --host 0.0.0.0 --port 5060
All SIP interactions are logged in sip_honeypot.log for further analysis and research.
The image above captures the Simple SIP Honeypot logging real-time SIP queries
Check out the other honeypot services for monitoring various network protocols:
- DNS Honeypot - Monitors DNS interactions.
- FTP Honeypot - Simulates an FTP server.
- LDAP Honeypot - Mimics an LDAP server.
- HTTP Honeypot - Monitors HTTP interactions.
- HTTPS Honeypot - Monitors HTTPS interactions.
- NTP Honeypot - Monitors Network Time Protocol interactions.
- PostgreSQL Honeypot - Simulates a PostgreSQL database server.
- SIP Honeypot - Monitors SIP (Session Initiation Protocol) interactions.
- SSH Honeypot - Emulates an SSH server.
- TELNET Honeypot - Simulates a TELNET server.
- Caution: This server is a honeypot. Employ responsibly in controlled network environments.
- Compliance: Adhere to local laws and regulations in deployment.
This project is distributed under the MIT License. See LICENSE
for more information.