User Tools

Site Tools


software:ipv6

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
software:ipv6 [2020/07/25 19:05] – [IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference] superwizardsoftware:ipv6 [2020/12/08 19:05] (current) – [Tools for IPV6] superwizard
Line 1: Line 1:
 ====== Tools for IPV6 ====== ====== Tools for IPV6 ======
  
 +<WRAP center round box >
 +Linux
 +    ping6 -i eth0 ff02::1
 +    ping6 -B -I eth0 -I [global IPv6 address attached to eth0] ff02::1
     ip -o -f inet6 addr     ip -o -f inet6 addr
-====== ICMPv6 Message Types ====== +    ip -f inet6 neighbor 
-  +    ip -6 neighbor show 
-From: http://ipv6.com/articles/general/ICMPv6.htm+     
 +Mac 
 +    iMac:~ andrew$ ndp -a
  
 +Windows
 +    ping -S [global IPv6 address] -6 ff02::2
 +    netsh interface ipv6 show neighbors
 +    netsh interface ipv6 show interface "Local Area Connection* 1"
 +    netsh interface ipv6 show interface
 +    netsh interface ipv6 delete neighbors
  
-Also See: http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/22974-icmpv6codes.html+From: http://billspeers.com/?q=node/259
  
 +    nmap -6 --script=broadcast-dhcp6-discover
 +    netsh int ipv6 show prefixpolicies
 +    netsh interface ipv6 show address
 +    netsh interface ipv6 show interface
 +    netsh interface ipv6 show neighbors
 +    netsh interface ipv6 delete neighbors
 +    netsh interface ipv6 show destinationcache
 +    netsh interface ipv6 delete destinationcache
 +    netsh interface ipv6 show route
 +    netsh interface ipv6 show joins
 +    netsh interface ipv6 show ipstats
 +    netsh interface ipv6 show global
 +    Netsh dns show state
 +    route print
 +    tracert
 +    Pathping
 +    ping
 +    ipconfig /displaydns
  
-{{http://ipv6.com/images/diagrams/ICMPv6_2.gif}} 
  
 +Powershell
 +    Get-Netneighbor -InterfaceIndex 4 -AddressFamily IPv6
  
-====== IPV6 address planning ======+nmap 
 +    nmap -PN -sT 2001:1::2/64 -p 3389 
 +    nmap -6 --script=targets-ipv6-multicast-echo.nse --script-args 'newtargets' -sL -d1 -oA c:\temp\nmap.txt 
 +    nmap -6 --script=targets-ipv6-multicast-echo.nse --script-args 'newtargets,interface=eth2' -sL  
 +    nmap -sU -p 10001 --script=ubiquiti-discovery.nse 10.2.2.0/24 
  
-From: https://www.safaribooksonline.com/library/view/ipv6-address-planning/9781491908211/ch04.html 
  
-{{https://www.safaribooksonline.com/library/view/ipv6-address-planning/9781491908211/images/ipap_0401.png}}+<code> 
 +2020-12-08 
 +File targets-ipv6-multicast-invalid-dst 
 +Script types: prerule 
 +Categories: discovery, broadcast 
 +Download: https://svn.nmap.org/nmap/scripts/targets-ipv6-multicast-invalid-dst.nse 
 +User Summary 
 +Sends an ICMPv6 packet with an invalid extension header to the all-nodes link-local multicast address (ff02::1) to discover (some) available hosts on the LAN. This works because some hosts will respond to this probe with an ICMPv6 Parameter Problem packet.
  
-====== IPv6 Subnetting Made Easy ======+</code>
  
-From: http://techxcellence.net/2011/05/09/v6-subnetting-made-easy/+From <https://nmap.org/nsedoc/scripts/targets-ipv6-multicast-invalid-dst.html> 
  
 +<code>
 +File targets-ipv6-multicast-echo
 +Script types: prerule
 +Categories: discovery, broadcast
 +Download: https://svn.nmap.org/nmap/scripts/targets-ipv6-multicast-echo.nse
 +User Summary
 +Sends an ICMPv6 echo request packet to the all-nodes link-local multicast address (ff02::1) to discover responsive hosts on a LAN without needing to individually ping each IPv6 address.
 +</code>
  
-{{http://techxcellence.net/img/v6-hexit-bit-range.png}}+From <https://nmap.org/nsedoc/scripts/targets-ipv6-multicast-echo.html> 
  
 <code> <code>
-The method presented here is for the quick subnetting in your head, which you  +    /dSploit/jni/nmap/scripts/targets-ipv6-multicast-echo.nse 
-should get by practiceSo it works well for a small number of subnets (16 max)  +    https://github.com/simpleverso/dsploit
-but can be expanded for any number of subnets.+
 </code> </code>
  
-{{http://techxcellence.net/img/quick-v6-subnet-chart.png}}+From <http://138.201.16.208/file/86135700/>  
 + 
 + 
 +<code> 
 +• nmap 
 +•  scripts 
 +•  targets-ipv6-multicast-echo.nse 
 +Find fileBlameHistoryPermalink 
 + 
 +Imported Upstream version 7.00 
 +</code> 
 + 
 +From <https://gitlab.com/kalilinux/packages/nmap/blob/6faefa8a2d0b469a1345a67e6376cc4d06e3279e/scripts/targets-ipv6-multicast-echo.nse>  
 + 
 +    Linux  
 +    Simply use the native ping and ip commands. 
 +    ping -6 -I <INTERFACE> ff02::1 
 +    ping -6 -I <INTERFACE> ff02::2 
 +    ip neigh 
 + 
 +From <https://pwn.no0.be/recon/network/neighbor_discovery/>  
 + 
 + 
 + 
 +Linux and Mac\\  
 + 
 +    v6disc.sh 
 + 
 +2020-08-01\\  
 +Synopsis\\  
 + 
 +A shell script to quickly & automatically discover IPv6 hosts, with the option to ping or run nmap against discovered hosts. 
 +Motivation\\  
 +There are three reasons to use v6disc.sh 
 + 1. Scan an IPv6 network 700,000 times faster than nmap 
 + 2. Auto Discovery of IPv6 hosts on the network (e.g. for IPAM) 
 + 3. Quickly figure out what IPv6 is already on your network. 
 +With 18,446,744,073,709,551,616 (2^64) potential addresses on a LAN segment, the old brute force method of scanning every address (e.g. with nnap) quickly becomes impractical. Even with version 7 of nmap, scanning a /64 still takes a week! v6disc.sh scans a /64 less than 5 seconds. 
 + 
 +From <https://github.com/cvmiller/v6disc>  
 + 
 +    ./v6disc.sh -h 
 +        ./v6disc.sh - auto discover IPv6 hosts  
 +        e.g. ./v6disc.sh -D -p 
 +        -p  Ping discovered hosts 
 +        -i  use this interface 
 +        -L  show link-local only 
 +        -D  Dual Stack, show IPv4 addresses 
 +        -N  Scan with nmap -6 -sT 
 +        -q  quiet, just print discovered hosts 
 + 
 +From <https://github.com/cvmiller/v6disc>  
 + 
 +</WRAP> 
 + 
 +====== Scamper measurement of connection information ====== 
 + 
 +From: http://www.caida.org/tools/measurement/scamper/ 
 + 
 +IPv6 and IPv4 active traceroute probing and ping 
 + 
 + 
 +<WRAP center round box > 
 +Scamper is designed to actively probe destinations in the Internet in parallel (at a specified  
 +packets-per-second rate) so that bulk data can be collected in a timely fashion. Scamper's native  
 +output file format is called warts: a warts file contains substantial meta data surrounding each  
 +individual measurement conducted, as well as substantial detail of responses received. The  
 +measurements conducted can range from simple to complex. An example of a simple measurement is  
 +where a single measurement method (e.g. traceroute) is used on a list of IP addresses to conduct  
 +a bulk measurement. A more complex measurement might be where the outcome of a previous test  
 +influences what happens next: for example, for each hop in a traceroute path, infer the address  
 +of the outgoing interface for the previous hop. Complex measurements are conducted by connecting  
 +to a running scamper process with a driver program which contains the logic.
  
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +</WRAP>
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ====== +
-====== IPv6 Subnet Cheat Sheet and IPv6 Cheat Sheet Reference ======+
  
 ====== Network Troubleshooting Tools, IPv4 and IPv6 ====== ====== Network Troubleshooting Tools, IPv4 and IPv6 ======
Line 407: Line 517:
  
  
-====== Scamper measurement of connection information ====== 
  
-From: http://www.caida.org/tools/measurement/scamper/ 
- 
-IPv6 and IPv4 active traceroute probing and ping 
- 
-<code> 
-Scamper is designed to actively probe destinations in the Internet in parallel (at a specified  
-packets-per-second rate) so that bulk data can be collected in a timely fashion. Scamper's native  
-output file format is called warts: a warts file contains substantial meta data surrounding each  
-individual measurement conducted, as well as substantial detail of responses received. The  
-measurements conducted can range from simple to complex. An example of a simple measurement is  
-where a single measurement method (e.g. traceroute) is used on a list of IP addresses to conduct  
-a bulk measurement. A more complex measurement might be where the outcome of a previous test  
-influences what happens next: for example, for each hop in a traceroute path, infer the address  
-of the outgoing interface for the previous hop. Complex measurements are conducted by connecting  
-to a running scamper process with a driver program which contains the logic. 
-</code> 
software/ipv6.1595703906.txt.gz · Last modified: 2020/07/25 19:05 by superwizard