THC-IPV6

 Last update 2018-01-04
 Current public version: v3.4
 Public source code repository: https://github.com/vanhauser-thc/thc-ipv6


 For german speaking people: In the german C't magazine 11/13 and the iX IPv6 Kompakt (4/13)
 are articles on how to use the thc-ipv6 toolkit to comprehensively test IPv6 firewalls.
 


 A complete tool set to attack the inherent protocol weaknesses of IPV6
 and ICMP6, and includes an easy to use packet factory library.


 [0x00] News and Changelog
 
        Note that there is now a public source code repository: https://github.com/vanhauser-thc/thc-ipv6
        No more private development version :-) ... you lucky guys (and girls) :)
         
	If you want to participate, here is a list of tools that would be interesting:
	  * Enhancing the library so it works on FreeBSD and OSX too
	  * Create a tool which tests an ipv6 address if it is an endpoint for various tunnel protocols
	  * Adding more exploit tests to exploit6 (I can supply a long list of exploit files)
	  * more?
	If you want to work on a topic on the list, email me, so not multiple people are working on the same tool.
	Contact: vh(at)thc(dot)org and put "antispam" in the subject line.


	CHANGELOG:
	##########

        v3.4
         * Added new function to thc-ipv6-lib: thc_send_raguard_bypass6()
           bypass attack found by ERNW in one easy function.
         * Added RA guard bypass attack (F option) to:
           - fake_router26
           - flood_router26
           - fake_advertise6
         * added new tool: flood_unreach6 (black nurse attack)
         * fake_pim6:
           - added bootstrap and assert support
           - added loop mode
           - added flood mode
           - rewrote help output
           - some fixes
         * fuzz_ip6: added PIM hello, bootstrap and assert support
         * alive6: fix for IPv6 address display for unreachable dst reason
         * implementation6: large fragmentation EH test added
         * covert_send6d: fixed receiving multiple packets (thanks to mculig for reporting)
         * better automatic source adress type selection
         * added patch to support the horrible openssl-1.1 release
         * some minor enhancements and fixes


 [0x01] Introduction
 	Welcome to the mini website of the THC IPV6 project.

	This code was inspired when I got into touch with IPv6, learned more and
	more about it - and then found no tools to play (read: "hack") around with.
	First I tried to implement things with libnet, but then found out that
	the ipv6 implementation is only partial - and sucks. I tried to add the
	missing code, but well, it was not so easy, hence I saved my time and
	quickly wrote my own library. (That was 2005 though, today libnet and
	other packet creation libraries have full IPv6 support.)


 [0x02] Disclaimer

	1. This tool is for legal purposes only!
	2. The AGPLv3 applies to this code.


 [0x03] Some Of The Included Tools
	- parasite6: icmp neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite)
	- alive6: an effective alive scanng, which will detect all systems listening to this address
	- dnsdict6: parallized dns ipv6 dictionary bruteforcer
	- fake_router6: announce yourself as a router on the network, with the highest priority
	- redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redirect spoofer
	- toobig6: mtu decreaser with the same intelligence as redir6
	- detect-new-ip6: detect new ip6 devices which join the network, you can run a script to automatically scan these systems etc.
	- dos-new-ip6: detect new ip6 devices and tell them that their chosen IP collides on the network (DOS).
	- trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN
	- flood_router6: flood a target with random router advertisements
	- flood_advertise6: flood a target with random neighbor advertisements
	- exploit6: known ipv6 vulnerabilities to test against a target
	- denial6: a collection of denial-of-service tests againsts a target
	- fuzz_ip6: fuzzer for ipv6
	- implementation6: performs various implementation checks on ipv6
	- implementation6d: listen daemon for implementation6 to check behind a fw
	- fake_mld6: announce yourself in a multicast group of your choice on the net
	- fake_mld26: same but for MLDv2
	- fake_mldrouter6: fake MLD router messages
	- fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication
	- fake_advertiser6: announce yourself on the network
	- smurf6: local smurfer
	- rsmurf6: remote smurfer, known to work only against linux at the moment
	- sendpees6: a tool by willdamn(ad)gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto stuff ;-) to keep the CPU busy. nice.
        - thcping6: sends a hand crafted ping6 packet
        [and about 30 more tools for you to discover!]


 [0x04] Installation 
 
	THC-IPV6 requires libpcap development files being installed, also the 
	libopenssl development files are a good idea.
	For Debian/Ubunut, you can install them by:
	  $ sudo apt-get install libpcap-dev libssl-dev libnetfilter-queue-dev

        To compile simply type
          $ make
          
        All tools are installed to /usr/local/bin if you type
          $ sudo make install


 [0x05] Documentation 
 
	THC-IPV6 comes with a rather long README file that describes the
	details about the usage and library interface.


 [0x06] Development & Contributions

	Your contributions are more than welcomed!
	
	If you find bugs, coded enhancements or wrote a new attack tool
	please send them to vh (at) thc (dot) org - and add the word "antispam"
	to the subject line.


 [0x07] The Art of Downloading: Source and Binaries
 

	The source code of THC-IPV6: thc-ipv6-3.4.tar.gz
	(Note: Linux only)
        Public source code repository: https://github.com/vanhauser-thc/thc-ipv6


 Comments and suggestions are welcome.

 Yours sincerly,

 van Hauser
 The Hackers Choice
 http://www.thc.org