Thc-Ipv6 使用
里面东西太多了,我也是慢慢学习使用,不对之处请见谅。这工具有点多所有会有一些长。工具以横排开始依次往下。
atk6-address6
将ipv4 或者 mac地址转变成ipv6地址,如果没有前缀,则链接为本地作为第二个选项给出。
我没有指定前缀所以他用的是本地的。并与是很懂这个命令。
atk6-alive6
应该是探测是探测某个IPV6地址是否活跃。
atk6-alive6 网卡 [ ipv6地址 ]
[ ipv6 ] 中括号可带可不带。
-v 显示详细信息 -o 输出结果
或者是想扫描ipv4地址 可以使用 -4 参数
但是此次扫描并没有我物理机的IPv6地址,只有虚拟机的ipv地址。
好像这种方式也能扫描
atk6-connect6
这个好像是判断端口是否打开?如果是连接的话我没有找到连接的方法。
如果连接成功返回0,超时/重置返回1
感觉现在的我只能用于判断是否打开了某个端口
当连接目标不存在端口134时出现报错提示。
当连接目标存在端口135、445时出现代码0
atk6-connsplit6(X)
我还不知道怎么使用这个功能。如果知道以后会补上
root@kali:~# atk6-connsplit6 -h
splitconnect6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: [-vd] atk6-connsplit6 INTERFACE client|serverOptions:-v verbose mode-d debug modeManipulates all incoming (client) or outgoing (server) TCP connections that are
from (server) or to (client) port 64446, and sets a new destinatin (server) or
source (client) address.
The purpose of this is a proof of concept to make connect analysis difficult.
It is recommended to use the splitconnect6.sh script to control this tool.
atk6-covert_send6(X)
我还不知道怎么使用这个功能。如果知道以后会补上
root@kali:~# atk6-covert_send6 -h
atk6-covert_send6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-covert_send6 [-m mtu] [-k key] [-s resend] interface target file [port]Options:-m mtu specifies the maximum MTU (default: interface MTU, min: 1000)-k key encrypt the content with Blowfish-160-s resend send each packet RESEND number of times, default: 1Sends the content of FILE covertly to the target, And its POC - don't except
too much sophistication - its just put into the destination header.
atk6-covert_send6d(X)
我还不知道怎么使用这个功能。如果知道以后会补上(感觉是和上面几个指令搭配使用)
root@kali:~# atk6-covert_send6d -h
atk6-covert_send6d 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-covert_send6d [-k key] interface fileOptions:-k key decrypt the content with Blowfish-160Writes covertly received content to FILE.
atk6-denial6(X)
我还不知道怎么使用这个功能。如果知道以后会补上
root@kali:~# atk6-denial6 -h
atk6-denial6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-denial6 interface destination test-case-numberPerforms various denial of service attacks on a target
If a system is vulnerable, it can crash or be under heavy load, so be careful!
The following test cases are currently implemented:1 : large hop-by-hop header with router-alert and filled with unknown options2 : large destination header filled with unknown options3 : hop-by-hop header with router alert option plus 180 headers4 : hop-by-hop header with router alert option plus 178 headers + ping5 : AH header + ping6 : first fragments of a ping with a hop-by-hop header with router alert7 : large hop-by-hop header filled with unknown options (no router alert)
atk6-detect-new-ip6
此工具检测加入本地网络的新IPv6地址。
如果提供了脚本,则首先使用检测到的IPv6地址执行脚本
atk6-detect-new-ip6 interface [script]
监听,当有新的ipv6地址加入本地他会在下面显示出来。
当你带有脚本的时候
atk6-detect_sniffer6
测试本地LAN上的系统是否正在嗅探。
适用于Windows、Linux、OS/X和*BSD
如果没有给定目标,则使用链路本地所有节点地址然而并不总是有效的。
并不是很懂这个工作模式。如果以后知道会补上来。
atk6-dnsdict6
枚举DNS条目的域,如果提供,则使用字典文件或内置列表。该工具基于gnucitizen.org的dnsmap。
-d 显示NS和MX DNS域信息上的IPv6信息
-4 也转储 IPv4 地址
-s 字典大小
-s(mall=100)
-m(edium=1419)
-l(arge=2601),
-x(treme=5886)
-u(ber=16724)
-t 线程数 默认8 最多32
-D 显示当前选择字典的内容,只显示出来不对其域名进行扫描
也可以使用自己的字典
atk6-dnsrevenum6(X)
atk6-dnsrevenum6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-dnsrevenum6 [-t] dns-server ipv6addressPerforms a fast reverse DNS enumeration and is able to cope with slow servers.
Option -t enables TCP instead of UDP (use this if you get many timeouts)
Examples:atk6-dnsrevenum6 dns.test.com 2001:db8:42a8::/48atk6-dnsrevenum6 -t dns.test.com 8.a.2.4.8.b.d.0.1.0.0.2.ip6.arpa
atk6-dnssecwalk(X)
root@kali:~# atk6-dnssecwalk -h
atk6-dnssecwalk 3.8 (c) 2020 by Marc Heuse <mh@mh-sec.de> http://www.mh-sec.deSyntax: atk6-dnssecwalk [-e46t] dns-server domainOptions:-e ensure that the domain is present in found addresses, quit otherwise-4 resolve found entries to IPv4 addresses-6 resolve found entries to IPv6 addresses-t use TCP instead of UDPPerform DNSSEC NSEC walking.Example: atk6-dnssecwalk dns.test.com test.com
atk6-dos-new-ip6(X)
root@kali:~# atk6-dos-new-ip6 -h
atk6-dos-new-ip6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-dos-new-ip6 [-S] interfaceThis tools prevents new IPv6 interfaces to come up, by sending answers to
duplicate ip6 checks (DAD). This results in a DOS for new IPv6 devices.Option -S sends conflicting NS query instead of NA reply, but it restricts
source randomization.
atk6-dump_dhcp6(X)
root@kali:~# atk6-dump_dhcp6 -h
atk6-dump_dhcp6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-dump_dhcp6 [-V vendorid] interface [target]Options:-V vendorid send vendorid number,string (e.g. 11,test)-N use fe80:: as source-n use empty mac as sourceDHCPv6 information tool. Dumps the available servers and their setup.
You can specify a specific DHCPv6 server as destination.
atk6-dump_router6(x)
root@kali:~# atk6-dump_router6 -h
atk6-dump_router6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-dump_router6 interface [target]Dumps all local routers and their information
atk6-exploit6(x)
root@kali:~# atk6-exploit6 -h
atk6-exploit6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-exploit6 interface destination [test-case-number]Performs exploits of various CVE known IPv6 vulnerabilities on the destination
Note that for exploitable overflows only 'AAA...' strings are used.
If a system is vulnerable, it will crash, so be careful!
atk6-extract_hosts6
打印文件中ipv6主机部分
atk6-extract_networks6
打印文件中找到的网络
atk6-fake_advertise6(X)
root@kali:~# atk6-fake_advertise6 -h
atk6-fake_advertise6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-fake_advertise6 [-DHF] [-Ors] [-n count] [-w seconds] interface ip-address-advertised [target-address [mac-address-advertised [source-ip-address]]]Advertise IPv6 address on the network (with own mac if not specified),
sending it to the all-nodes multicast address if no target address is set.
Source ip address is the address advertised if not set.Sending options:-n count send how many packets (default: forever)-w seconds wait time between the packets sent (default: 5)-m srcmac the srcmac address to send from (not what is advertised!
Flag options:-O do NOT set the override flag (default: on)-r DO set the router flag (default: off)-s DO set the solicitate flag (default: off)
ND Security evasion options (can be combined):-F full evasion attack (no other evasion options allowed)-H add a hop-by-hop header-f add a one shot fragment header (can be specified multiple times)-D add a large destination header which fragments the packet.
atk6-fake_dhcps6(x)
root@kali:~# atk6-fake_dhcps6 -h
atk6-fake_dhcps6 3.8 (c) 2020 by van Hauser / THC <vh@thc.org> www.github.com/vanhauser-thc/thc-ipv6Syntax: atk6-fake_dhcps6 interface network-address/prefix-length dns-server [dhcp-server-ip-address [mac-address]]Fake DHCPv6 server. Use to configure an address and set a DNS server
!!!我悟了,擅百技,不如专修一计。
Thc-Ipv6 使用相关推荐
- mitm6:通过IPv6攻破IPv4网络
一.前言 虽然IPv6正在互联网上逐步推广,但在内部网络环境中使用IPv6的公司依然非常稀少.然而,大多数公司并不知道,即使他们没有主动去使用IPv6,但从Windows Vista以来,所有的Win ...
- Kali-linux:atk6-thcping6命令
kali linux提供了默认的一套dhcp ddos工具集合,代码位于https://github.com/vanhauser-thc/thc-ipv6 Readme文件内容原文如下: THC-IP ...
- tmac v6设置中文_支持ipv6类型的ddos测试工具thc-ipv6
官网地址 https://www.thc.org/thc-ipv6/ 下载 wget https://www.thc.org/releases/thc-ipv6-2.7.tar.gz 安装 [root ...
- IPv6 与 IPv4现状
IPv6 与 IPv4现状 一.概述 (1) IPv4可提供bai4,294,967,296个地址,IPv6将原来的32位地址空间增大du到128位,数目是zhi2的128次方.能够对地球上每平方米d ...
- DCN-cs6200 ipv6 isatap 隧道
DCN-cs6200 ipv6 isatap 隧道: SW-1配置: CS6200-28X-EI>enable CS6200-28X-EI#config terminal CS6200-28X- ...
- DCN-cs6200 ipv6 6to4隧道
DCN-cs6200 ipv6 6to4隧道: SW-1配置: CS6200-28X-EI>enable CS6200-28X-EI#config terminal CS6200-28X-EI( ...
- IPv6地址分类及表示方法
对于IPv4地址,我们知道分为A类.B类.C类.组播地址和留用地址,几大类,ABC类地址中还会有不同功能的如广播地址.私有地址等类型.那么IPv6的地址是怎么分类的呢?本文就带大家初步了解一下. 先说 ...
- IPV6的设置问题!
最近一段在研究IPV6,在网上搜了好多资料,但是感觉大部分都不实在,都是泛泛而谈,实用性不强,故决定做点什么!正所谓该出手时就出手,风风火火闯九州哦~~ IPV6设置步骤: 1.首先查看你时候安装了I ...
- OSS正式支持IPv6公测
背景 6月20日阿里云宣布全面支持IPv6, 随后阿里云开放对象存储OSS也逐步开始向用户公测. 公测步骤 正常使用IPv6服务,除了OSS端支持还需要客户端支持,我们做一些检查证明客户端具备访问 I ...
- 在全面部署 IPV6 前,你需要了解都在这儿
IPv6 的发展形势 近日,中办国办印发<推进互联网协议第六版(IPv6)规模部署行动计划>(以下简称<计划>),加快推进基于 IPv6 的下一代互联网规模部署,计划指出到 2 ...
最新文章
- java基础-值传递
- 中学生可以这样学python.pdf_中学生可以这样学Python
- 用漫画的方式理解共享锁和排他锁
- 算法练习day8——190326(队列实现栈、栈实现队列)
- 关于C#中将数字转换为指定格式
- Windows终端利器Cmder
- 使用Java 8 Lambda表达式将实体映射到DTO
- vagrant网站中box下载方法
- 聊聊毕业设计系列 --- 系统实现
- Spring Boot(十三)RabbitMQ安装与集成
- C++ STL string的属性
- 问答 请问使用OK(raw:jpg)能返回多张图片吗
- 企业转向云服务的速度比企业的思想更快
- 北京内推 | 微软亚洲研究院视觉计算组招聘研究与开发实习生
- curl怎么输出赋值_伺服电动缸怎么控制?
- 生物信息分析服务器平台,高通量数据生物信息分析平台
- IDA报错Unexpected fatal error while intitailizing Python runtime
- EDA 电子设计自动化VHDL系列课程8 – 脉冲信号发生器
- activiti 5.19整合modeler在线编辑器
- php(wap)获取手机号码,WAP获取访客手机号码