IPv6 Toolkit
IPv6 assessment and troubleshooting tools suite for security testing of IPv6 networks and implementations. Includes tools for address scanning, fragmentation attacks, ICMPv6 manipulation, and blackhole detection.
Description
The IPv6 Toolkit provides a comprehensive set of tools for assessing IPv6 network security and troubleshooting IPv6 implementations. It enables security professionals to test for vulnerabilities in IPv6 protocol handling, including fragmentation attacks, ICMPv6 neighbor discovery manipulation, flow label processing, and jumbogram support. The toolkit is particularly useful for penetration testers evaluating IPv6 deployments against known attack vectors documented in IPv6 security research.
Key use cases include discovering IPv6 blackholes caused by improper extension header processing, performing host discovery through advanced scanning techniques, and launching protocol-specific attacks to validate IPv6 stack robustness. Tools like scan6 enable efficient IPv6 address scanning across prefixes while accounting for common Interface ID generation algorithms, and blackhole6 helps isolate network devices dropping IPv6 packets with specific extension headers.
Each tool targets specific aspects of IPv6 security, from Router Advertisement flooding (ra6) to TCP segment manipulation (tcp6). The suite supports both attack simulation for red team operations and diagnostic functions for IPv6 network administrators identifying deployment flaws.
How It Works
The toolkit implements IPv6 protocol manipulation at the packet level using libpcap for raw socket operations. Tools construct malformed, oversized, or unexpected IPv6 packets including extension headers (Destination Options, Hop-by-Hop, Fragmentation), jumbograms, and ICMPv6 messages with invalid parameters. Security assessment relies on observing target responses or lack thereof to crafted packets, exploiting protocol processing assumptions documented in IPv6 RFCs and security advisories. Scanning tools use optimized algorithms for common IID generation patterns (EUI-64, privacy extensions, vendor-specific) combined with multiple probe types (ICMPv6 Echo, TCP, unrecognized options) to maximize host discovery rates.
Installation
sudo apt install ipv6toolkitFlags
Examples
addr6 -hscan6 -i eth0 -L -e -vscan6 -d 2001:db8::/64 --tgt-virtual-machines all --ipv4-host 10.10.10.0/24scan6 -d 2001:db8::/64 --tgt-ipv4-embedded ipv4-32 --ipv4-host 10.10.10.0/24scan6 -d fc00::/64 --tgt-vendor 'Dell Inc' -p tcpscan6 -i eth0 -L -S 66:55:44:33:22:11 -p unrec -P global -vscan6 -d 2001:db8::/64 -w KNOWN_IIDSflow6 -d DST_ADDR -i INTERFACE