Go to file
2024-04-17 13:43:46 +02:00
doc responde a un register con unauthorized 2022-12-07 13:52:00 +01:00
installation/openbsd remember rotate logs 2024-04-17 13:37:16 +02:00
src log to stdout or to a file 2024-04-16 16:36:40 +02:00
.gitignore log en vez de println 2024-04-15 15:20:59 +02:00
Cargo.lock config file 2024-04-16 13:57:47 +02:00
Cargo.toml config file 2024-04-16 13:57:47 +02:00
config.toml docker container 2024-04-16 17:39:33 +02:00
Dockerfile docker container 2024-04-16 17:39:33 +02:00
Makefile some aclarations on README 2024-04-17 13:43:46 +02:00
README.md some aclarations on README 2024-04-17 13:43:46 +02:00

SIP tarpit

The idea is that a SIP attacker lost more time while trying to crack this "SIP service". Could be defined as a slow honeypot...

Initially will be designed against a sipvicious attacker.

SIP features:

  • Answer to OPTIONS This way will be mapped in the network

  • Answer to REGISTER This way attacker will be entertained for some time... :D

Use

  • Docker: simply do make docker-build && make docker-run
  • Install: enter installation directory and run install.sh

Configure

Read config.toml and adapt it to your preferences. Keep in mind that for docker use you want to keep log_file="CONSOLE".