Home page logo

nmap-dev logo Nmap Development mailing list archives

Re: EXPERT IPv6 network scaning
From: David Fifield <david () bamsoftware com>
Date: Tue, 17 Apr 2012 14:25:51 -0700

On Mon, Apr 16, 2012 at 06:28:28PM +0530, niteesh kumar wrote:
On Thu, Apr 12, 2012 at 1:47 PM, niteesh kumar <niteesh3 () gmail com> wrote:

On Thu, Apr 12, 2012 at 12:19 PM, David Fifield <david () bamsoftware com>wrote:

On Thu, Apr 12, 2012 at 10:58:39AM +0530, niteesh kumar wrote:
On Wed, Apr 11, 2012 at 7:46 AM, David Fifield <david () bamsoftware com

On Wed, Apr 11, 2012 at 01:19:08AM +0530, niteesh kumar wrote:
I observed one more thing, target-ipv6-multicast-slaac.nse do scan
a lot
ips which MLD script doesnot but those ip which are not scanned my
also not responding to Ping msgs <ECHO>. this may be attributed to
who actually take part in address configuration but do not
communicate in
IPv6 network or may be due to some firewall not responding to ICMP
May be a possibility that the slaac script is not checking the
reachability  of scanned nodes.

This is common to all targets scripts. I have seen phantom addresses
come from the slaac script on Windows too. Scripts should not verify
addresses themselves. Nmap will do its own more reliable ND
of the added addresses. ICMPv6 echo is less reliable than ND.

IN case of dual stack <ipv4 and ipv6 togather> nmap can be used to scan
ipv4 addresses in the network, and henceforth use icmpv6 node Info
messages<type 139> to get their respective ipv6 addresses.

The ipv6-node-info script does this. (Actually it gives you IPv4
addresses when you know the IPv4 address; is it possible to go the other

what i was thinking is to send a NI query of code 2<data ipv4 address> to
all-node multicast address <ff02::1> putting ipv4 scanned addresses. This
may result in nodes responding with required information.
 also it would be interesting to see what happens if a noop query is sent
to all node multicast.

Another scheme in dual stack implementation can be to scan the IPv4 network
get their MAC addresses and then preform inverse neighbor discovery to get
their IPv6 address.

This is another good idea. You could even just try stuffing the MAC
address into the EUI-64 format and try pinging it.

David Fifield
Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]