DVRTC: intentionally vulnerable VoIP/WebRTC lab with SIP enumeration, RTP bleed, TURN abuse, and credential cracking exercises

Author here. DVRTC is our attempt to fill a gap that’s been there for a while: web app security has DVWA and friends, but there’s been nothing equivalent for VoIP and WebRTC attack techniques.

The first scenario (pbx1) deploys a full stack — Kamailio as the SIP proxy, Asterisk as the back-end PBX, rtpengine for media, coturn for TURN/STUN — with each component configured to exhibit specific vulnerable behaviors:

  • Kamailio returns distinguishable responses for valid vs. invalid extensions (enumeration), logs User-Agent headers to MySQL without sanitisation (SQLi), and has a special handler that triggers digest auth leaks for extension 2000
  • rtpengine is using default configuration, that enables RTP bleed (leaking media from other sessions) and RTP injection
  • coturn uses hardcoded credentials and a permissive relay policy for the TURN abuse exercise
  • Asterisk has extension 1000 with a weak password (1500) for online cracking

7 exercises with step-by-step instructions. There’s also a live instance at pbx1.dvrtc.net if you want to try it without standing up your own.

Happy to answer questions.

submitted by /u/EnableSecurity
[link] [comments]

Read More >>

Moment hero firefighters save three cats with CPR after rescue from blaze – as fans thank them for ‘never giving up’

THIS is the heart racing moment brave firefighters saved four beloved cats from a blazing apartment fire before giving one of the pets CPR. The dramatic rescue was caught on camera after the animals were discovered trapped inside the smokey apartment. …

Read More >>

U.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Aquasecurity Trivy flaw, tracked as CVE-2026-33634 (CVSS score of 9.3), to its Known Exploited Vulnerabilities (KEV) catalog. On March 19, 2026, attackers used compromised credentials to release a malicious […]

Read More >>