User Tools

Site Tools


software:ipv6

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
software:ipv6 [2020/07/25 19:07] – [Scamper measurement of connection information] superwizardsoftware:ipv6 [2020/12/08 19:05] (current) – [Tools for IPV6] superwizard
Line 1: Line 1:
 ====== Tools for IPV6 ====== ====== Tools for IPV6 ======
  
 +<WRAP center round box >
 +Linux
 +    ping6 -i eth0 ff02::1
 +    ping6 -B -I eth0 -I [global IPv6 address attached to eth0] ff02::1
     ip -o -f inet6 addr     ip -o -f inet6 addr
 +    ip -f inet6 neighbor
 +    ip -6 neighbor show
 +    
 +Mac
 +    iMac:~ andrew$ ndp -a
 +
 +Windows
 +    ping -S [global IPv6 address] -6 ff02::2
 +    netsh interface ipv6 show neighbors
 +    netsh interface ipv6 show interface "Local Area Connection* 1"
 +    netsh interface ipv6 show interface
 +    netsh interface ipv6 delete neighbors
 +
 +From: http://billspeers.com/?q=node/259
 +
 +    nmap -6 --script=broadcast-dhcp6-discover
 +    netsh int ipv6 show prefixpolicies
 +    netsh interface ipv6 show address
 +    netsh interface ipv6 show interface
 +    netsh interface ipv6 show neighbors
 +    netsh interface ipv6 delete neighbors
 +    netsh interface ipv6 show destinationcache
 +    netsh interface ipv6 delete destinationcache
 +    netsh interface ipv6 show route
 +    netsh interface ipv6 show joins
 +    netsh interface ipv6 show ipstats
 +    netsh interface ipv6 show global
 +    Netsh dns show state
 +    route print
 +    tracert
 +    Pathping
 +    ping
 +    ipconfig /displaydns
 +
 +
 +Powershell
 +    Get-Netneighbor -InterfaceIndex 4 -AddressFamily IPv6
 +
 +nmap
 +    nmap -PN -sT 2001:1::2/64 -p 3389
 +    nmap -6 --script=targets-ipv6-multicast-echo.nse --script-args 'newtargets' -sL -d1 -oA c:\temp\nmap.txt
 +    nmap -6 --script=targets-ipv6-multicast-echo.nse --script-args 'newtargets,interface=eth2' -sL 
 +    nmap -sU -p 10001 --script=ubiquiti-discovery.nse 10.2.2.0/24 
 +
 +
 +<code>
 +2020-12-08
 +File targets-ipv6-multicast-invalid-dst
 +Script types: prerule
 +Categories: discovery, broadcast
 +Download: https://svn.nmap.org/nmap/scripts/targets-ipv6-multicast-invalid-dst.nse
 +User Summary
 +Sends an ICMPv6 packet with an invalid extension header to the all-nodes link-local multicast address (ff02::1) to discover (some) available hosts on the LAN. This works because some hosts will respond to this probe with an ICMPv6 Parameter Problem packet.
 +
 +</code>
 +
 +From <https://nmap.org/nsedoc/scripts/targets-ipv6-multicast-invalid-dst.html> 
 +
 +<code>
 +File targets-ipv6-multicast-echo
 +Script types: prerule
 +Categories: discovery, broadcast
 +Download: https://svn.nmap.org/nmap/scripts/targets-ipv6-multicast-echo.nse
 +User Summary
 +Sends an ICMPv6 echo request packet to the all-nodes link-local multicast address (ff02::1) to discover responsive hosts on a LAN without needing to individually ping each IPv6 address.
 +</code>
 +
 +From <https://nmap.org/nsedoc/scripts/targets-ipv6-multicast-echo.html> 
 +
 +<code>
 +    /dSploit/jni/nmap/scripts/targets-ipv6-multicast-echo.nse
 +    https://github.com/simpleverso/dsploit
 +</code>
 +
 +From <http://138.201.16.208/file/86135700/> 
 +
 +
 +<code>
 +• nmap
 +•  scripts
 +•  targets-ipv6-multicast-echo.nse
 +Find fileBlameHistoryPermalink
 +
 +Imported Upstream version 7.00
 +</code>
 +
 +From <https://gitlab.com/kalilinux/packages/nmap/blob/6faefa8a2d0b469a1345a67e6376cc4d06e3279e/scripts/targets-ipv6-multicast-echo.nse> 
 +
 +    Linux 
 +    Simply use the native ping and ip commands.
 +    ping -6 -I <INTERFACE> ff02::1
 +    ping -6 -I <INTERFACE> ff02::2
 +    ip neigh
 +
 +From <https://pwn.no0.be/recon/network/neighbor_discovery/> 
 +
 +
 +
 +Linux and Mac\\ 
 +
 +    v6disc.sh
 +
 +2020-08-01\\ 
 +Synopsis\\ 
 +
 +A shell script to quickly & automatically discover IPv6 hosts, with the option to ping or run nmap against discovered hosts.
 +Motivation\\ 
 +There are three reasons to use v6disc.sh
 + 1. Scan an IPv6 network 700,000 times faster than nmap
 + 2. Auto Discovery of IPv6 hosts on the network (e.g. for IPAM)
 + 3. Quickly figure out what IPv6 is already on your network.
 +With 18,446,744,073,709,551,616 (2^64) potential addresses on a LAN segment, the old brute force method of scanning every address (e.g. with nnap) quickly becomes impractical. Even with version 7 of nmap, scanning a /64 still takes a week! v6disc.sh scans a /64 less than 5 seconds.
 +
 +From <https://github.com/cvmiller/v6disc> 
 +
 +    ./v6disc.sh -h
 +        ./v6disc.sh - auto discover IPv6 hosts 
 +        e.g. ./v6disc.sh -D -p
 +        -p  Ping discovered hosts
 +        -i  use this interface
 +        -L  show link-local only
 +        -D  Dual Stack, show IPv4 addresses
 +        -N  Scan with nmap -6 -sT
 +        -q  quiet, just print discovered hosts
 +
 +From <https://github.com/cvmiller/v6disc> 
 +
 +</WRAP>
 +
 +====== Scamper measurement of connection information ======
 +
 +From: http://www.caida.org/tools/measurement/scamper/
 +
 +IPv6 and IPv4 active traceroute probing and ping
 +
 +
 +<WRAP center round box >
 +Scamper is designed to actively probe destinations in the Internet in parallel (at a specified 
 +packets-per-second rate) so that bulk data can be collected in a timely fashion. Scamper's native 
 +output file format is called warts: a warts file contains substantial meta data surrounding each 
 +individual measurement conducted, as well as substantial detail of responses received. The 
 +measurements conducted can range from simple to complex. An example of a simple measurement is 
 +where a single measurement method (e.g. traceroute) is used on a list of IP addresses to conduct 
 +a bulk measurement. A more complex measurement might be where the outcome of a previous test 
 +influences what happens next: for example, for each hop in a traceroute path, infer the address 
 +of the outgoing interface for the previous hop. Complex measurements are conducted by connecting 
 +to a running scamper process with a driver program which contains the logic.
 +
 +</WRAP>
 +
 ====== Network Troubleshooting Tools, IPv4 and IPv6 ====== ====== Network Troubleshooting Tools, IPv4 and IPv6 ======
  
software/ipv6.1595704057.txt.gz · Last modified: 2020/07/25 19:07 by superwizard