thc-ipv6

Tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6

A complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. The THC IPV6 ATTACK TOOLKIT comes already with lots of effective attacking tools: - parasite6: ICMPv6 neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite) - alive6: an effective alive scanng, which will detect all systems listening to this address - dnsdict6: parallized DNS IPv6 dictionary bruteforcer - fake_router6: announce yourself as a router on the network, with the highest priority - redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever ICMPv6 redirect spoofer - toobig6: mtu decreaser with the same intelligence as redir6 - detect-new-ip6: detect new IPv6 devices which join the network, you can run a script to automatically scan these systems etc. - dos-new-ip6: detect new IPv6 devices and tell them that their chosen IP collides on the network (DOS). - trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN - flood_router6: flood a target with random router advertisements - flood_advertise6: flood a target with random neighbor advertisements - fuzz_ip6: fuzzer for IPv6 - implementation6: performs various implementation checks on IPv6 - implementation6d: listen daemon for implementation6 to check behind a FW - fake_mld6: announce yourself in a multicast group of your choice on the net - fake_mld26: same but for MLDv2 - fake_mldrouter6: fake MLD router messages - fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication - fake_advertiser6: announce yourself on the network - smurf6: local smurfer - rsmurf6: remote smurfer, known to work only against linux at the moment - exploit6: known IPv6 vulnerabilities to test against a target - denial6: a collection of denial-of-service tests againsts a target - thcping6: sends a hand crafted ping6 packet - sendpees6: a tool by willdamn@gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto stuff ;-) to keep the CPU busy. nice. and about 25 more tools for you to discover :-) Just run the tools without options and they will give you help and show the command line options.

There is no official package available for openSUSE Leap 15.5

Distributions

openSUSE Tumbleweed

openSUSE Leap 15.5

openSUSE Leap 15.4

openSUSE Backports for SLE 15 SP3

SUSE SLE-15-SP2

SUSE SLE-15-SP1

SUSE SLE-11 SP 4

Unsupported distributions

The following distributions are not officially supported. Use these packages at your own risk.

SUSE:SLE-15:GA

openSUSE:Leap:15.0

openSUSE:Leap:15.1

SUSE:SLE-11:SP3

SUSE:SLE-12:SLE-Module-Toolchain

SUSE:SLE-12:SLE-Module-Adv-Systems-Management

openSUSE:Leap:42.1

openSUSE:Leap:42.2

openSUSE:Leap:42.3