Skip to content

EnableSecurity/DVRTC

Repository files navigation

DVRTC - Damn Vulnerable Real-Time Communications

License: PolyForm Noncommercial

DVRTC is an intentionally vulnerable VoIP/WebRTC lab for security training and research.

Warning

Deploy DVRTC only on isolated, dedicated systems. Do not run it alongside production workloads or sensitive data. Expect weak credentials, exposed services, and vulnerable behavior by design.

What Is DVRTC?

DVRTC packages a vulnerable RTC deployment together with scenario documentation, exercises, and verification tooling. Users can run the stack, explore attack paths, and confirm behavior against the current repository state. The bundled exercises use the included test toolkit, but any external VoIP/RTC security tool works against the stack too (see awesome-rtc-hacking for ideas).

Current Scope

The current repository ships one active scenario: pbx1.

  • Stack: Kamailio, Asterisk, rtpengine, coturn, Nginx, and MySQL.
  • Focus: SIP signaling, digest auth leakage, weak credentials, RTP/media abuse, TURN relay abuse, and SIP-adjacent SQL/XSS paths.
  • 7 exercises and 12 identified attack paths. Additional vulnerability behaviors are covered in the scenario reference docs and automated regression checks.
  • Runs on published images out of the box. The image versions are pinned in docker-compose.yml and VERSION. For local rebuilds, see docs/development.md.

A live deployment of the pbx1 scenario is currently available at pbx1.dvrtc.net. Verify it is reachable before relying on it. See the pbx1 Scenario Overview for the public endpoints and usage notes.

Start here for scenario-specific details:

pbx1 public deployment screenshot

Quick Start

Prerequisites

  • Docker 20.10 or newer
  • Docker Compose plugin with docker compose support
  • Linux host with host networking support
  • At least 4 CPU cores, 8 GB RAM, and 10 GB disk space recommended for the full stack

If you are on macOS, use the Colima workflow in docs/colima-setup.md. Direct Docker Desktop deployment on macOS or Windows is not the supported path for this stack.

Initial Setup

./scripts/setup_networking.sh
./scripts/generate_passwords.sh
./scripts/init-selfsigned.sh
./scripts/validate_env.sh
docker compose up -d

Once the stack is up, you're ready to jump into the hands-on exercises in the pbx1 Exercise Index.

If you want publicly trusted certificates instead of self-signed lab certs, set DOMAIN and EMAIL in .env and use ./scripts/init-letsencrypt.sh instead.

Verify The Stack

docker compose ps

Manual host-shell check (requires .env sourced for the IP variable):

. ./.env
curl "http://${PUBLIC_IPV4}/"

Wrapper scripts for the bundled test suites:

./scripts/testing-smoke.sh
./scripts/testing-run-all.sh
./scripts/attacker-run-all.sh

Use PUBLIC_IPV4 from .env for browser and host-side access checks. On Colima or another Linux VM workflow, that VM address is the canonical DVRTC endpoint even if the platform also forwards ports onto the macOS host. The testing runner targets 127.0.0.1 inside the Linux host network namespace. See TESTING.md for the full command reference.

For a quick manual SIP check, register extension 1000 with password 1500 in a SIP client and call 1200 for the echo service.

Key Documentation

Inspiration

DVRTC was inspired by vulnerable training platforms like DVWA, WebGoat, and WrongSecrets.

License

DVRTC is licensed under the PolyForm Noncommercial License 1.0.0.

Project Links

About

DVRTC (Damn Vulnerable Real-Time Communications) is an intentionally vulnerable VoIP/WebRTC platform for security training and research, with isolated lab scenarios covering SIP enumeration, digest leaks, RTP bleed, SQL injection, XSS, and TURN relay abuse.

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages