THC-IPV6 1.9 Released – Attacking the IPV6 Protocol
Labels:
dos attack,
Hacking Tools
A complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. Please note to get full access to all the available tools you need to develop IPV6 tools yourself or submit patches, tools and feedback to the thc-ipv6 project.
Change Log 1.9
- added new tool: detect_sniffer6 (Windows, Linux, *BSD, OS X, ...)
- added new tool: fake_router26 which gives more control on options
- added new tool: dnsrevenum6 which reverse enumerates the DNS
- added new tool: inverse_lookup6 which gets the IPv6 addresses of a mac address
- added new tool: fake_solicitate6 which lets you fake neighbor solicate packets
- added new tool: address6 converts between ipv6 <=> ipv4 and mac addresses
- added new tool: passive_discovery6 which detects all sending systems and includes DAD detection
- dnsdic6:
- added full SRV service scan support (-S option)
- fix for x64 systems, thanks to alphacc(at)altern(dot)org
- some more minor fixes
- thcping6:
- added -U udp option
- return code -1 no reply, 0 reply, 1 error reply
- fuzz_ip6:
- added TCP (-0 port) to the fuzzer with tstamp, mss + wscale options
- return code 0 on tests done and target alive, 1 on target crashed
- detect-new-ip6: now the interface is passed as 2nd cmdline option to the script
- implementation6:
- added more tests (AH + ESP ping tests, 8k exthdr, 2k exthdr size)
- fixes for some tests
- returns -1 on errors, 0 if at least one reply, 1 if no or only error replies
- parasite6:
- fixed a crash when -F and -R were used together
- parasite6 now terminates as it should, also ending childrens when using -l
- fixed the mac command line parameter that was not working
- trace6:
- fixed a crash
- made it a bit faster
- fix for targets further away than 18 hops
- enhanced error messages
- kill_router6: fixed '*' target option
- dos-new-ip6: also DOSes non-link-local addresses now
- toobig6: fixed crash when mtu size specified was < 47
- send errors dont result in program exits for flood_*, fuzz_ip6 and ndpexhaust6 tools anymore
- thc-ipv6-lib:
- changed the thc_pcap_function to
- have a an addition parameter, promisc (before it was not promiscous)
- reduce CPU load, which affects detect-new-ip6, dos-new-ip6 and parasite6
- changed some function defines from/to signed/unsigned
- cleaned up the code
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Tuesday, July 10, 2012
The Hacker News - Daily Updates