THC-IPv6-Attack-Toolkit/alive6

From aldeid
Jump to: navigation, search
You are here:
alive6

Description

Alive6 is part of THC IPv6 Attack Toolkit. Alive6 shows alive addresses in the segment. If you specify a remote router, the packets are sent with a routing header prefixed by fragmentation.

Installation

Please refer to this section.

Usage

Syntax

alive6 [-dlmrS] [-W TIME] [-i FILE] [-o FILE] [-s NUMBER] interface [unicast-or-multicast-address [remote-router]]

Options

-i <FILE>
check systems from input file
-o <FILE>
write results to output file
-m
enumerate from hardware addresses in input fule
-l
use link-local address instead of global address
-d
resolve alive ipv6 addresses
-W
time in ms to wait after sending a packet (default: 10)
-S
slow mode, get best router for each remote target or when proxy-NA
-n <NUMBER>
how often to send each packet (default: 1)
-s <NUMBER>
scan type, bit-wise add:
1-ping
2-invalid header
4-invalid hop-by-hop
8-udp dns
16-tcp ack highport
32-tcp syn ssh
64-tcp syn web
128-tcp syn ssl

Example

# alive6 eth1
Warning: unprefered IPv6 address had to be selected
Alive: fe80::20c:29ff:fe97:320f
Found 1 system alive

Comments

blog comments powered by Disqus