[ipv6hackers] Finding v6 hosts by efficiently mapping ip6.arpa

Marc Heuse mh at mh-sec.de
Thu Mar 29 17:24:22 CEST 2012


This is very interesting.

I have never read about this before, so I'd guess you are the first,
congrats!

there seems to be a bug in your tool - I played a bit, it has done >
70kb requests and has not found a reverse entry I know exists - and I
confirmed that your technique work on that DNS server.

I decided to add this functionality to the dnsdict6 tool in my thc-ipv6
package :-)

Greets,
Marc

Am 28.03.2012 22:23, schrieb Peter van Dijk:
> Hi folks,
> 
> in a discussion with a friend recently the thought occurred to me that due to how NOERROR and NXDOMAIN in DNS work, finding all existing reverses in an ip6.arpa reverse zone could be done very quickly.
> 
> I have written a blog post at http://7bits.nl/blog/2012/03/26/finding-v6-hosts-by-efficiently-mapping-ip6-arpa that explains the workings. Code at https://github.com/habbie/ip6-arpa-scan/
> 
> I was unable to find any existing references to this trick; if you do have any, please let me know!
> 
> Kind regards,
> Peter van Dijk
> _______________________________________________
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
> http://lists.si6networks.com/listinfo/ipv6hackers

--
Marc Heuse
www.mh-sec.de

PGP: FEDD 5B50 C087 F8DF 5CB9  876F 7FDD E533 BF4F 891A



More information about the Ipv6hackers mailing list