THC-IPv6-Attack-Toolkit/alive6
Jump to navigation
Jump to search
You are here: | alive6
|
Description
Alive6 is part of THC IPv6 Attack Toolkit. Alive6 shows alive addresses in the segment. If you specify a remote router, the packets are sent with a routing header prefixed by fragmentation.
Installation
Please refer to this section.
Usage
Syntax
alive6 [-dlmrS] [-W TIME] [-i FILE] [-o FILE] [-s NUMBER] interface [unicast-or-multicast-address [remote-router]]
Options
- -i <FILE>
- check systems from input file
- -o <FILE>
- write results to output file
- -m
- enumerate from hardware addresses in input fule
- -l
- use link-local address instead of global address
- -d
- resolve alive ipv6 addresses
- -W
- time in ms to wait after sending a packet (default: 10)
- -S
- slow mode, get best router for each remote target or when proxy-NA
- -n <NUMBER>
- how often to send each packet (default: 1)
- -s <NUMBER>
- scan type, bit-wise add:
- 1-ping
- 2-invalid header
- 4-invalid hop-by-hop
- 8-udp dns
- 16-tcp ack highport
- 32-tcp syn ssh
- 64-tcp syn web
- 128-tcp syn ssl
Example
# alive6 eth1 Warning: unprefered IPv6 address had to be selected Alive: fe80::20c:29ff:fe97:320f Found 1 system alive