Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: EXPERT IPv6 network scaning
From: niteesh kumar <niteesh3 () gmail com>
Date: Mon, 9 Apr 2012 11:22:55 +0530

On Mon, Apr 9, 2012 at 8:34 AM, David Fifield <david () bamsoftware com> wrote:

On Mon, Apr 09, 2012 at 01:01:23AM +0200, Patrik Karlsson wrote:
Thanx patrik for that great patch. but still i cannot see the scanning
result on screen though i could see the packets coming in wireshark.
I am
running ubuntu in Vmware. Can you please test it your system once
again.
  Please  find the new script attached which include patch given by
Patrik and also some parameter changes that improve the result
further.

Niteesh



I've been working with Niteesh off list to iron out the last bugs and
just
committed the latest version of the script r28418.
Great work Niteesh!

Thanks for your work guys. The NSE description is the same as for
targets-ipv6-invalid-dst; looks like just an oversight.

I'm getting this error:

~/nmap-git$ sudo ./nmap -6 --script=targets-ipv6-mld --script-args
interface=br0 -e br0 --packet-trace -d

Starting Nmap 5.61TEST5 ( http://nmap.org ) at 2012-04-08 20:01 PDT
PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
--------------- Timing report ---------------
 hostgroups: min 1, max 100000
 rtt-timeouts: init 1000, min 100, max 10000
 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
 parallelism: min 0, max 0
 max-retries: 10, host-timeout: 0
 min-rate: 0, max-rate: 0
---------------------------------------------
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
NSE: Starting targets-ipv6-mld.
Initiating NSE at 20:01
NSOCK (0.0380s) PCAP requested on device 'br0' with berkeley filter
'ip6[40:1] == 58' (promisc=0 snaplen=1500 to_ms=200) (IOD #1)
NSOCK (0.0380s) PCAP created successfully on device 'br0' (pcap_desc=5
bsd_hack=0 to_valid=1 l3_offset=14) (IOD #1)
NSOCK (0.1410s) Pcap read request from IOD #1  EID 13
NSOCK (0.1410s) Callback: READ-PCAP SUCCESS for EID 13
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1410s) Pcap read request from IOD #1  EID 21
NSOCK (10.1410s) Callback: READ-PCAP TIMEOUT for EID 21
NSE: > | CLOSE
NSE: Finished targets-ipv6-mld.
NSE: Finished targets-ipv6-mld.
Completed NSE at 20:01, 10.10s elapsed
NSOCK (10.1410s) nsi_delete() (IOD #1)
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Read from /home/david/nmap-git: nmap-services.
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 10.15 seconds
          Raw packets sent: 0 (0B) | Rcvd: 0 (0B)
NSOCK (10.1410s) nsi_delete() (IOD #1)

Here's what tcpdump sees (just one packet):

20:03:31.628811 IP6 fe80::1e6f:65ff:feb6:cad3 > ff02::1: HBH ICMP6,
multicast listener querymax resp delay: 0 addr: ::, length 24
       0x0000:  6000 0000 0020 0001 fe80 0000 0000 0000  `...............
       0x0010:  1e6f 65ff feb6 cad3 ff02 0000 0000 0000  .oe.............
       0x0020:  0000 0000 0000 0001 3a00 0502 0000 0100  ........:.......
       0x0030:  8200 322f 0000 0000 0000 0000 0000 0000  ..2/............
       0x0040:  0000 0000 0000 0000                      ........

David Fifield



Patrix would you mind changing description to


description = [[
Sends an MLD query with maximum response delay 0 to the
to discover available hosts on the LAN. This works because
hosts will respond to this probe with an MLD report packet and
as maximum response delay is 0 nobody gets time to wait for others`
 report even in the same multicast group.
]]

 the script is working for me without error what about you Patrik?

$sudo ./nmap -6 --script=targets-ipv6-mld --script-args interface=eth0 -e
eth0 --packet-trace -d

Starting Nmap 5.61TEST5 ( http://nmap.org ) at 2012-04-08 22:31 PDT
PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
NSE: Starting targets-ipv6-mld.
Initiating NSE at 22:31
NSOCK (0.0620s) PCAP requested on device 'eth0' with berkeley filter
'ip6[40:1] == 58' (promisc=0 snaplen=1500 to_ms=200) (IOD #1)
NSOCK (0.0620s) PCAP created successfully on device 'eth0' (pcap_desc=6
bsd_hack=0 to_valid=1 l3_offset=14) (IOD #1)
NSOCK (0.1150s) Pcap read request from IOD #1  EID 13
NSOCK (0.1150s) Callback: READ-PCAP SUCCESS for EID 13
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1150s) Pcap read request from IOD #1  EID 21
NSOCK (0.1160s) Callback: READ-PCAP SUCCESS for EID 21
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1180s) Pcap read request from IOD #1  EID 29
NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 29
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1180s) Pcap read request from IOD #1  EID 37
NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 37
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1180s) Pcap read request from IOD #1  EID 45
NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 45
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1180s) Pcap read request from IOD #1  EID 53
NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 53
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1180s) Pcap read request from IOD #1  EID 61
NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 61
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1180s) Pcap read request from IOD #1  EID 69
NSOCK (0.1180s) Callback: READ-PCAP SUCCESS for EID 69
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1190s) Pcap read request from IOD #1  EID 77
NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 77
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1190s) Pcap read request from IOD #1  EID 85
NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 85
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1190s) Pcap read request from IOD #1  EID 93
NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 93
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1190s) Pcap read request from IOD #1  EID 101
NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 101
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1190s) Pcap read request from IOD #1  EID 109
NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 109
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1190s) Pcap read request from IOD #1  EID 117
NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 117
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1190s) Pcap read request from IOD #1  EID 125
NSOCK (0.1190s) Callback: READ-PCAP SUCCESS for EID 125
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1200s) Pcap read request from IOD #1  EID 133
NSOCK (0.1200s) Callback: READ-PCAP SUCCESS for EID 133
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1200s) Pcap read request from IOD #1  EID 141
NSOCK (0.1200s) Callback: READ-PCAP SUCCESS for EID 141
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1200s) Pcap read request from IOD #1  EID 149
NSOCK (0.1760s) Callback: READ-PCAP SUCCESS for EID 149
NSE: Error while parsing IPv6 extension headers.
NSOCK (0.1760s) Pcap read request from IOD #1  EID 157
NSOCK (10.1810s) Callback: READ-PCAP TIMEOUT for EID 157
NSE: > | CLOSE
NSE: Finished targets-ipv6-mld.
NSE: Finished targets-ipv6-mld.
Completed NSE at 22:32, 10.12s elapsed
NSOCK (10.1820s) nsi_delete() (IOD #1)
Pre-scan script results:
| targets-ipv6-mld:
|   IP: fe80::b078:c639:b146:8102  MAC: 78:84:3c:f6:d3:74  IFACE: eth0
|   IP: fe80::40cd:699b:f177:9c6e  MAC: 00:26:22:d7:79:26  IFACE: eth0
|   IP: fe80::545e:73:7f22:93c6    MAC: c8:2a:14:07:c8:3e  IFACE: eth0
|   IP: fe80::ccce:ce1e:75ab:1ecb  MAC: 00:23:8b:d0:22:73  IFACE: eth0
|   IP: fe80::5c02:72d5:8e4c:f9ae  MAC: 78:84:3c:f4:16:a0  IFACE: eth0
|   IP: fe80::18a0:ee96:32eb:2fa6  MAC: f0:de:f1:71:55:43  IFACE: eth0
|   IP: fe80::29e2:1a15:99c8:4d39  MAC: 90:e6:ba:bc:d1:03  IFACE: eth0
|   IP: fe80::10b5:3a10:3b62:d107  MAC: f0:de:f1:9f:52:ec  IFACE: eth0
|   IP: fe80::d413:fcc4:ed78:b4eb  MAC: f0:4d:a2:58:d4:d4  IFACE: eth0
|   IP: fe80::e064:b78b:19ac:1f47  MAC: 00:26:22:04:55:7a  IFACE: eth0
|   IP: fe80::5d0:f6d2:733:8a7     MAC: 54:42:49:f3:3c:ed  IFACE: eth0
|   IP: fe80::64d0:fa38:59ea:c1cb  MAC: 54:42:49:05:24:58  IFACE: eth0
|   IP: fe80::21ec:a135:a069:766d  MAC: b8:ac:6f:59:fc:83  IFACE: eth0
|   IP: fe80::d543:2918:1607:aa19  MAC: 10:1f:74:11:0a:00  IFACE: eth0
|   IP: fe80::1564:d9c1:ba5f:336d  MAC: 18:03:73:8a:d7:66  IFACE: eth0
|   IP: fe80::6482:d4bd:9671:f36   MAC: 00:1d:92:55:b6:9d  IFACE: eth0
|   IP: fe80::f8f4:bec:450:f623    MAC: 00:16:d3:ff:d3:db  IFACE: eth0
|
|_  Use --script-args=newtargets to add the results as targets
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Read from /home/niteesh/Desktop/nmap: nmap-services.
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 10.27 seconds
           Raw packets sent: 0 (0B) | Rcvd: 0 (0B)
NSOCK (10.1820s) nsi_delete() (IOD #1)


-Niteesh
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]