Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

PIN Retrieval Tool

The PIN retrieval tool allows sipXecs administrators the ability to extract all user PIN numbers. The following assumptions are made by the tool:

  • PIN numbers are ONLY numeric
  • PIN numbers are no less than 4 numbers
  • PIN numbers are no more than 7 numbers

Though these assumptions could be changed, be advised that PIN numbers larger than 7 numbers could take a while to decrypt.

Installation

Download here.

This tool requires no installation, but you might need to install postgresql-python on your system:

yum install postgresql-python

Once you have copied the tool to your server you should make it executable:

chmod +x getpin.py

Usage

Before this tool can be used, you must change the passwd_realm variable to whatever your domain name is for your sipXecs system. If your PostgreSQL values are different than the variables in the script you must change those as well. Remember to keep either single or double quotes around your variable values. Here are the default values:

############################## Modify These ###############################
pg_host = '127.0.0.1'
pg_port = 5432
pg_user = 'postgres'
pg_pass = ''
pg_db = 'SIPXCONFIG'
pg_table = 'users'
# The domain name of your system *required*
passwd_realm = 'host.domain.tld'
# Change location of output file here *optional*
outputfile = open('pinlist.csv','w')
###########################################################################

Once you have changes these values to match your environment simply run the tool:

./getpin.py

The program will, by default, output to pinlist.csv in the same folder as the tool.

  • No labels