7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.4 High
AI Score
Confidence
High
0.286 Low
EPSS
Percentile
96.9%
> The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled network. The built-in modules support enumeration of IPv6 features such as ICMPv6 and Multicast Listener Discovery (MLD). In addition, the framework also supports enumeration of Upper Layer Protocols (ULP) such as multicast DNS (mDNS) and Link-Local Multicast Name Resolution (LLMNR). Users can easily expand the capability of the framework by creating plugins and modules in the Python language.
Requirements
Installation
Standard
[Optional] Use a virtualenv for installation: virtualenv venv && source venv/bin/activate
git clone http://github.com/apg-intel/ipv6tools.git
sudo pip install -r requirements.txt
Development
git clone http://github.com/apg-intel/ipv6tools.git
git checkout dev
npm run setup
Usage
Standard
sudo python app.py
Development
$ npm run serve
npm run dev
CLI TODO
Modules
Modules are classes that allow interaction with individual nodes or all nodes. These show up as a right click option on each node, or as a button below the graph.
Included Modules
Included in the project are a couple of modules to help validate your network, as well as use as examples for your own modules.
Custom Modules
All modules are located in /modules
and are automatically loaded when starting the server. Included in /modules
is a file called template.py
. This file contains the class that all modules must extend in order to display correctly and communicate with the webpage.
Use this template to build a custom module
from template import Template
class IPv6Module(Template):
def __init__(self, socketio, namespace):
super(IPv6Module, self).__init__(socketio, namespace)
self.modname = "CVE-2016-1879"
self.menu_text = "FreeBSD IPv6 DoS"
self.actions = [
{
"title": "FreeBSD IPv6 DoS", #name that's displayed on the buttons/menu
"action": "action", #method name to call
"target": True #set this to true to display it in the right-click menu
}
]
def action(self, target=None):
# send a log msg
self.socket_log('Running DoS on '+target['ip'])
# do stuff, etc
# [merge results](<https://www.kitploit.com/search/label/Merge%20Results> "merge results" ) with main result set
listOfDicts = [{ip: '::1', device_name: 'test'}]
self.module_merge(listOfDicts)
Known Issues
dnet
or dumbnet
- follow the instructions below.Installing libdnet
git clone https://github.com/dugsong/libdnet.git
cd libdnet
./configure && make
sudo make install
cd python
python setup.py install
libpcap headers in Ubuntu
sudo apt install libpcap-dev
7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.4 High
AI Score
Confidence
High
0.286 Low
EPSS
Percentile
96.9%