Note |
---|
Use this tool at your own risk. It was hacked together somewhat hastily and may have unforseen issues. |
PIN Retrieval Tool
The PIN retrieval tool allows sipXecs administrators the ability to extract all user PIN numbers. The following assumptions are made by the tool:
- PIN numbers are ONLY numeric
- PIN numbers are no less than 4 numbers
- PIN numbers are no more than 7 numbers
Though these assumptions could be changed, be advised that PIN numbers larger than 7 numbers could take a while to decrypt.
Installation
Download xecsuser:here.
This tool requires no installation, but you might need to install postgresql-python on your system:
Code Block |
---|
yum install postgresql-python |
Once you have copied the tool to your server you should make it executable:
Code Block |
---|
chmod +x getpin.py |
Usage
Before this tool can be used, you must change the passwd_realm variable to whatever your domain name is for your sipXecs system. If your PostgreSQL values are different than the variables in the script you must change those as well. Remember to keep either single or double quotes around your variable values. Here are the default values:
Code Block |
---|
############################## Modify These ###############################
pg_host = '127.0.0.1'
pg_port = 5432
pg_user = 'postgres'
pg_pass = ''
pg_db = 'SIPXCONFIG'
pg_table = 'users'
# The domain name of your system *required*
passwd_realm = 'host.domain.tld'
# Change location of output file here *optional*
outputfile = open('pinlist.csv','w')
########################################################################### |
Once you have changes these values to match your environment simply run the tool:
Code Block |
---|
./getpin.py |
The program will, by default, output to pinlist.csv in the same folder as the tool.