This is simple 5060 port exploit that calls to a receiver VoIP device with pre-defined phrase.
The app establishes a TCP connection and write a VoIP Payload with the INVITE method which initiates a call with pre-defined "caller-name" which is our phrase
.
Application
1. git clone https://github.com/iveresk/voip-caller.git
2. cd voip-caller
3. go build -o /voip-caller
4. ./voip-caller -t <target_url or file_name> [OPTIONAL] -d false -s <YOUR_PHRASE>
- t - target URL or filename
- d - debug {true, false} flag which enables or disables logs
- s - is your "caller name" which is your phrase
Docker with pre-defined 20k ruzzian VoIP devices.
docker run -d masterroot/voip-caller
Have fun with ruzzland-terrorist-state
VoIP devices :D
You are free to contact me via Keybase for any details.