Exploitationipv6attacktoolkiticmpv6dosscanningspoofingdnsdhcpv6

THC IPv6 Attack Toolkit

Comprehensive IPv6 and ICMPv6 attack toolkit for testing protocol weaknesses, network discovery, and denial-of-service attacks. Includes tools for scanning, spoofing, flooding, and exploiting IPv6 implementations.

Description

The THC IPv6 Attack Toolkit provides a collection of specialized tools for assessing IPv6 network security by exploiting protocol weaknesses. It enables penetration testers to perform alive scanning, detect new devices, conduct DNS enumeration, and execute various denial-of-service attacks against IPv6 and ICMPv6 implementations. Tools cover neighbor discovery manipulation, router advertisement flooding, DHCPv6 fuzzing, and implementation checks useful for firewall testing.

Use cases include IPv6 network reconnaissance, protocol vulnerability validation, and red team exercises targeting misconfigured IPv6 deployments. The toolkit supports evasion techniques like fragmentation headers and hop-by-hop options to bypass RA guards and firewalls. It works against Windows, Linux, OS/X, and BSD systems, with many tools leveraging link-local and multicast addresses for local network attacks.

Caution is advised as some tools can crash vulnerable systems or cause heavy network load. The suite is particularly valuable for auditing enterprise IPv6 rollouts where default configurations often expose attack surfaces.

How It Works

Tools craft malformed or spoofed IPv6/ICMPv6 packets exploiting protocol behaviors like Duplicate Address Detection (DAD), Neighbor Discovery (ND), Router Advertisements (RA), and Multicast Listener Discovery (MLD). Scanning uses ping, erroneous packets, and port probes; DoS leverages header flooding (hop-by-hop, destination), fragmentation, and amplification via multicast. Spoofing impersonates routers/DHCP servers via NA/RA/MLD packets; fuzzing mutates packet fields/headers to trigger crashes. Evasion adds extension headers (fragmentation, routing, jumbo) to bypass filters. Many tools sniff network traffic for dynamic targeting and support source randomization.

Installation

bash
sudo apt install thc-ipv6

Flags

-vverbose information (multiple times for more detail)
-i filecheck systems from input file (alive6)
-Menumerate hardware addresses (MAC) from input addresses (slow!)
-4 ipv4/rangetest various IPv4 address encodings per network
-Ffirewall mode with multiple probe types
-n numberhow often to send each packet
-t THREADSnumber of threads to use (dnsdict6)
-Hadd hop-by-hop header
-Dadd large destination header
-fadd fragmentation header

Examples

Convert IPv6 address to MAC address
address6 fe80::76d4:35ff:fe4e:39c8
Convert MAC address to IPv6 address
address6 74:d4:35:4e:39:c8
Scan for alive IPv6 hosts on interface eth0
alive6 eth0
Detect new IPv6 devices joining the network on eth0
detect-new-ip6 eth0
Perform DNS IPv6 dictionary brute force on example.com
dnsdict6 example.com
Perform DoS test case 1 (large hop-by-hop header) against target
atk6-denial6 eth0 <target> 1
Announce fake router on network
atk6-fake_router6 eth0 fe80::1 2001:db8::/64
Flood network with random router advertisements
atk6-flood_router6 eth0
Updated 2026-04-16kali.org ↗