PIN retrieval tool

Use this tool at your own risk. It was hacked together somewhat hastily and may have unforseen issues.

PIN Retrieval Tool

The PIN retrieval tool allows sipXecs administrators the ability to extract all user PIN numbers. The following assumptions are made by the tool:

  • PIN numbers are ONLY numeric
  • PIN numbers are no less than 4 numbers
  • PIN numbers are no more than 7 numbers

Though these assumptions could be changed, be advised that PIN numbers larger than 7 numbers could take a while to decrypt.

Installation

Download xecsuser:here.

This tool requires no installation, but you might need to install postgresql-python on your system:

yum install postgresql-python

Once you have copied the tool to your server you should make it executable:

chmod +x getpin.py

Usage

Before this tool can be used, you must change the passwd_realm variable to whatever your domain name is for your sipXecs system. If your PostgreSQL values are different than the variables in the script you must change those as well. Remember to keep either single or double quotes around your variable values. Here are the default values:

############################## Modify These ###############################
pg_host = '127.0.0.1'
pg_port = 5432
pg_user = 'postgres'
pg_pass = ''
pg_db = 'SIPXCONFIG'
pg_table = 'users'
# The domain name of your system *required*
passwd_realm = 'host.domain.tld'
# Change location of output file here *optional*
outputfile = open('pinlist.csv','w')
###########################################################################

Once you have changes these values to match your environment simply run the tool:

./getpin.py

The program will, by default, output to pinlist.csv in the same folder as the tool.