THC-IPV6
Last update 2018-01-04
Current public version: v3.4
Public source code repository: https://github.com/vanhauser-thc/thc-ipv6
For german speaking people: In the german C't magazine 11/13 and the iX IPv6 Kompakt (4/13)
are articles on how to use the thc-ipv6 toolkit to comprehensively test IPv6 firewalls.
A complete tool set to attack the inherent protocol weaknesses of IPV6
and ICMP6, and includes an easy to use packet factory library.
[0x00] News and Changelog
Note that there is now a public source code repository: https://github.com/vanhauser-thc/thc-ipv6
No more private development version :-) ... you lucky guys (and girls) :)
If you want to participate, here is a list of tools that would be interesting:
* Enhancing the library so it works on FreeBSD and OSX too
* Create a tool which tests an ipv6 address if it is an endpoint for various tunnel protocols
* Adding more exploit tests to exploit6 (I can supply a long list of exploit files)
* more?
If you want to work on a topic on the list, email me, so not multiple people are working on the same tool.
Contact: vh(at)thc(dot)org and put "antispam" in the subject line.
CHANGELOG:
##########
v3.4
* Added new function to thc-ipv6-lib: thc_send_raguard_bypass6()
bypass attack found by ERNW in one easy function.
* Added RA guard bypass attack (F option) to:
- fake_router26
- flood_router26
- fake_advertise6
* added new tool: flood_unreach6 (black nurse attack)
* fake_pim6:
- added bootstrap and assert support
- added loop mode
- added flood mode
- rewrote help output
- some fixes
* fuzz_ip6: added PIM hello, bootstrap and assert support
* alive6: fix for IPv6 address display for unreachable dst reason
* implementation6: large fragmentation EH test added
* covert_send6d: fixed receiving multiple packets (thanks to mculig for reporting)
* better automatic source adress type selection
* added patch to support the horrible openssl-1.1 release
* some minor enhancements and fixes
[0x01] Introduction
Welcome to the mini website of the THC IPV6 project.
This code was inspired when I got into touch with IPv6, learned more and
more about it - and then found no tools to play (read: "hack") around with.
First I tried to implement things with libnet, but then found out that
the ipv6 implementation is only partial - and sucks. I tried to add the
missing code, but well, it was not so easy, hence I saved my time and
quickly wrote my own library. (That was 2005 though, today libnet and
other packet creation libraries have full IPv6 support.)
[0x02] Disclaimer
1. This tool is for legal purposes only!
2. The AGPLv3 applies to this code.
[0x03] Some Of The Included Tools
- parasite6: icmp neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite)
- alive6: an effective alive scanng, which will detect all systems listening to this address
- dnsdict6: parallized dns ipv6 dictionary bruteforcer
- fake_router6: announce yourself as a router on the network, with the highest priority
- redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redirect spoofer
- toobig6: mtu decreaser with the same intelligence as redir6
- detect-new-ip6: detect new ip6 devices which join the network, you can run a script to automatically scan these systems etc.
- dos-new-ip6: detect new ip6 devices and tell them that their chosen IP collides on the network (DOS).
- trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN
- flood_router6: flood a target with random router advertisements
- flood_advertise6: flood a target with random neighbor advertisements
- exploit6: known ipv6 vulnerabilities to test against a target
- denial6: a collection of denial-of-service tests againsts a target
- fuzz_ip6: fuzzer for ipv6
- implementation6: performs various implementation checks on ipv6
- implementation6d: listen daemon for implementation6 to check behind a fw
- fake_mld6: announce yourself in a multicast group of your choice on the net
- fake_mld26: same but for MLDv2
- fake_mldrouter6: fake MLD router messages
- fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication
- fake_advertiser6: announce yourself on the network
- smurf6: local smurfer
- rsmurf6: remote smurfer, known to work only against linux at the moment
- sendpees6: a tool by willdamn(ad)gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto stuff ;-) to keep the CPU busy. nice.
- thcping6: sends a hand crafted ping6 packet
[and about 30 more tools for you to discover!]
[0x04] Installation
THC-IPV6 requires libpcap development files being installed, also the
libopenssl development files are a good idea.
For Debian/Ubunut, you can install them by:
$ sudo apt-get install libpcap-dev libssl-dev libnetfilter-queue-dev
To compile simply type
$ make
All tools are installed to /usr/local/bin if you type
$ sudo make install
[0x05] Documentation
THC-IPV6 comes with a rather long README file that describes the
details about the usage and library interface.
[0x06] Development & Contributions
Your contributions are more than welcomed!
If you find bugs, coded enhancements or wrote a new attack tool
please send them to vh (at) thc (dot) org - and add the word "antispam"
to the subject line.
[0x07] The Art of Downloading: Source and Binaries
The source code of THC-IPV6: thc-ipv6-3.4.tar.gz
(Note: Linux only)
Public source code repository: https://github.com/vanhauser-thc/thc-ipv6
Comments and suggestions are welcome.
Yours sincerly,
van Hauser
The Hackers Choice
http://www.thc.org