[ipv6hackers] nmap NSE scripts
Joe Klein
jsklein at gmail.com
Fri Oct 11 19:24:56 CEST 2013
Adam,
I had done the same thing, converting my IPv6 c++ and SCAPY attack/audit
applications into a private nmap scripts repository, as a fun exercise. The
scripts work better, since the recent nmap upgrade. So thank you Fyodor
for making nmap better for scripting.
Joe Klein
On Thu, Oct 10, 2013 at 7:26 PM, Fyodor <fyodor at nmap.org> wrote:
> On Mon, Oct 7, 2013 at 3:01 PM, Adam Števko <adam.stevko at gmail.com> wrote:
>
> > Hi guys,
> >
> > as a part of a semester project, I decided to enhance nmap with several
> > NSE scripts for various IPv6 vulnerabilities. These NSE scripts should be
> > based on their counterparts from various IPv6 toolkits available out
> there,
> > most notably thc-ipv6 and IPv6 toolkit. Implementing some of those tools
> as
> > nmap NSE scripts will make them available to a larger audience and enable
> > to run on wide range of platforms.
>
>
> Hi Adam. We'd certainly appreciate your help as IPv6 has long been a major
> Nmap priority. I added the initial support more than 11 years ago (August
> 2002) and it has slowly improved to the point where almost all Nmap
> functionality now supports IPv6. That includes raw packet port scanning,
> version detection, our custom machine-learning-based IPv6 OS detection
> system, and of course the Nmap Scripting Engine. We're also rather proud
> of our multicast IPv6 host discovery systems.
>
> That being said, there is always room for improvement. And NSE is usually
> the best way to implement new techniques. Nmap's top priority is network
> discovery, so that functionality is most welcome. Also, you'll want to
> make sure you don't duplicate our existing IPv6-related scripts, such as:
>
> broadcast-dhcp6-discover
> http://nmap.org/nsedoc/scripts/broadcast-dhcp6-discover.html
> * Sends a DHCPv6 request (Solicit) to the DHCPv6 multicast address, parses
> the response, then extracts and prints the address along with any options
> returned by the server.
>
> dns-ip6-arpa-scan http://nmap.org/nsedoc/scripts/dns-ip6-arpa-scan.html
> * Performs a quick reverse DNS lookup of an IPv6 network using a technique
> which analyzes DNS server response codes to dramatically reduce the number
> of queries needed to enumerate large networks.
>
> ipv6-node-info http://nmap.org/nsedoc/scripts/ipv6-node-info.html
> * Obtains hostnames, IPv4 and IPv6 addresses through IPv6 Node Information
> Queries.
>
> ipv6-ra-flood http://nmap.org/nsedoc/scripts/ipv6-ra-flood.html
> * Generates a flood of Router Advertisements (RA) with random source MAC
> addresses and IPv6 prefixes. Computers, which have stateless
> autoconfiguration enabled by default (every major OS), will start to
> compute IPv6 suffix and update their routing table to reflect the accepted
> announcement. This will cause 100% CPU usage on Windows and platforms,
> preventing to process other application requests.
>
> targets-ipv6-multicast-echo
> http://nmap.org/nsedoc/scripts/targets-ipv6-multicast-echo.html
> * Sends an ICMPv6 echo request packet to the all-nodes link-local multicast
> address (<code>ff02::1</code>) to discover responsive hosts on a LAN
> without needing to individually ping each IPv6 address.
>
> targets-ipv6-multicast-invalid-dst
> http://nmap.org/nsedoc/scripts/targets-ipv6-multicast-invalid-dst.html
> * Sends an ICMPv6 packet with an invalid extension header to the all-nodes
> link-local multicast address (<code>ff02::1</code>) to discover (some)
> available hosts on the LAN. This works because some hosts will respond to
> this probe with an ICMPv6 Parameter Problem packet.
>
> targets-ipv6-multicast-mld
> http://nmap.org/nsedoc/scripts/targets-ipv6-multicast-mld.html
> * Attempts to discover available IPv6 hosts on the LAN by sending an MLD
> (multicast listener discovery) query to the link-local multicast address
> (ff02::1) and listening for any responses. The query's maximum response
> delay set to 0 to provoke hosts to respond immediately rather than waiting
> for other responses from their multicast group.
>
> targets-ipv6-multicast-slaac
> http://nmap.org/nsedoc/scripts/targets-ipv6-multicast-slaac.html
> * Performs IPv6 host discovery by triggering stateless address
> auto-configuration (SLAAC).
>
> One of our main criteria for accepting new scripts is that they meet a
> concrete need of security/networking admins/analysts. So instead of just
> saying "this sends an IPv6 blahblah probe and prints the response", tell us
> why someone might send such a probe and how the information returned can be
> useful.
>
> Also, as Fernando noted, you don't need to base all your ideas on thc-ipv6
> and the IPv6 Toolkit. Those are wonderful tools, but you don't need to
> limit yourself to things they can already do.
>
> Cheers, and best wishes for your project!
> -Fyodor
> _______________________________________________
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
> http://lists.si6networks.com/listinfo/ipv6hackers
>
More information about the Ipv6hackers
mailing list