DVRTC is an intentionally vulnerable VoIP/WebRTC lab for security training and research.
Deploy DVRTC only on isolated, dedicated systems. Do not run it alongside production workloads or sensitive data. Expect weak credentials, exposed services, and vulnerable behavior by design.
DVRTC packages a vulnerable RTC deployment together with scenario documentation, exercises, and verification tooling. Users can run the stack, explore attack paths, and confirm behavior against the current repository state. The bundled exercises use the included test toolkit, but any external VoIP/RTC security tool works against the stack too (see awesome-rtc-hacking for ideas).
The repository currently ships two scenarios:
pbx1is the Kamailio/Asterisk/rtpengine scenario.pbx2is the OpenSIPS/FreeSWITCH/rtpproxy scenario.
Run only one scenario at a time on a given host. Both scenarios rely on host networking for the core RTC services and reuse overlapping ports, so pbx1 and pbx2 cannot run concurrently on the same machine.
Scenario summaries:
- Stack: Kamailio, Asterisk, rtpengine, coturn, Nginx, and MySQL.
- Focus: SIP signaling, digest auth leakage, weak credentials, RTP/media abuse, TURN relay abuse, and SIP-adjacent SQL/XSS paths.
- Exercises: 7 step-by-step exercises and 12 identified attack paths. Additional vulnerable behaviors are covered in the scenario docs and regression checks.
- Start:
./scripts/compose.sh --scenario pbx1 up -d
- Stack: OpenSIPS, FreeSWITCH, rtpproxy, and the shared web/helper surfaces.
- Focus: SIP signaling, plaintext traffic analysis, weak credentials, digest leak, RTP/media abuse, recorded packet captures, and SIP flood behavior.
- Exercises: 8 step-by-step
pbx2exercise stubs cover the current attack paths. The bundled smoke/regression suites remain the source of truth for reproducibility. The MySQL-backed SQLi/XSS surface frompbx1is intentionally not part ofpbx2. - Start:
./scripts/compose.sh --scenario pbx2 up -d
Both scenarios use pinned runtime images from the compose manifest set in compose/base.yml, compose/pbx1.yml, compose/pbx2.yml, and VERSION. For local rebuilds, see docs/development.md.
Live deployments are currently available:
- pbx1 at
pbx1.dvrtc.net— see the pbx1 Scenario Overview for public endpoints and usage notes. - pbx2 at
pbx2.dvrtc.net— see the pbx2 Scenario Overview for public endpoints and usage notes.
Verify reachability before relying on either deployment.
Start here for scenario-specific details:
- pbx1 Scenario Overview
- pbx1 Exercise Index
- pbx1 Architecture
- pbx2 Scenario Overview
- pbx2 Exercise Index
- pbx2 Architecture
- Docker 20.10 or newer
- Docker Compose plugin with
docker composesupport - Linux host with host networking support
- At least 4 CPU cores, 8 GB RAM, and 10 GB disk space recommended for the full stack
If you are on macOS, use the Colima workflow in docs/colima-setup.md. Direct Docker Desktop deployment on macOS or Windows is not the supported path for this stack.
./scripts/setup_networking.sh
./scripts/generate_passwords.sh
./scripts/init-selfsigned.sh
./scripts/validate_env.sh
./scripts/compose.sh --scenario pbx1 up -dOnce the stack is up, you're ready to jump into the hands-on exercises in the pbx1 Exercise Index.
To start the pbx2 scenario instead, use:
./scripts/compose.sh --scenario pbx2 up -dEquivalent raw Compose commands are:
docker compose --project-directory . -p dvrtc-pbx1 -f compose/base.yml -f compose/pbx1.yml up -d
docker compose --project-directory . -p dvrtc-pbx2 -f compose/base.yml -f compose/pbx2.yml up -dPlain docker compose up -d is not a valid scenario selector here. The base file at compose/base.yml only carries shared runner definitions, so it exits with no service selected unless you add a scenario file or use the wrapper.
Do not start both raw scenario commands at the same time on the same host. pbx1 and pbx2 overlap on host-networked SIP, web, TURN, and RTP ports. The wrapper script handles this by stopping the other scenario before startup.
If you want publicly trusted certificates instead of self-signed lab certs, set DOMAIN and EMAIL in .env and use ./scripts/init-letsencrypt.sh instead.
./scripts/compose.sh --scenario pbx1 psManual host-shell check (requires .env sourced for the IP variable):
. ./.env
curl "http://${PUBLIC_IPV4}/"Wrapper scripts for the bundled test suites:
./scripts/testing-smoke.sh
./scripts/testing-run-all.sh
./scripts/attacker-run-all.sh
./scripts/testing-smoke.sh --scenario pbx2
./scripts/testing-run-all.sh --scenario pbx2
./scripts/attacker-run-all.sh --scenario pbx2Use PUBLIC_IPV4 from .env for browser and host-side access checks. On Colima or another Linux VM workflow, that VM address is the canonical DVRTC endpoint even if the platform also forwards ports onto the macOS host. The testing runner targets 127.0.0.1 inside the Linux host network namespace. See TESTING.md for the full command reference. Use ./scripts/compose.sh for normal runtime operations. ./scripts/dev-compose.sh is the maintainer rebuild wrapper.
For a quick manual SIP check, register extension 1000 with password 1500 in a SIP client and call 1200 for the echo service.
- pbx1 Scenario Overview - credentials, ports, component roles, and scenario entry points
- pbx1 Exercise Index - current hands-on exercise set
- pbx2 Scenario Overview - current
pbx2stack, attack paths, and exposed surfaces - pbx2 Exercise Index - current
pbx2exercise stubs for all known scenario paths - Troubleshooting - current repo-specific failure modes and diagnostics
- Development and Local Builds - maintainer rebuild workflow and platform constraints
- Contributing - contribution expectations for this project
DVRTC was inspired by vulnerable training platforms like DVWA, WebGoat, and WrongSecrets.
DVRTC is licensed under the PolyForm Noncommercial License 1.0.0.
- Website: Enable Security
- Newsletter: RTCSec Newsletter (monthly)


