
上QQ阅读APP看书,第一时间看更新
Using IPv6 - specific tools
Kali includes several tools that were developed to take advantage of IPv6 (most comprehensive scanners, such as nmap, now support IPv6), some of which are as follows; tools that are particular to IPv6 were largely derived from the THC-IPv6 Attack Toolkit.
The following table provides a list of tools that are utilized for IPv6 reconnaissance:

Metasploit can also be utilized for IPv6 host discovery. The auxiliary/scanner/discovery/ipv6_multicast_ping module will discover all the IPv6 enabled machines with the physical (MAC) address, as shown in the following screenshot:

THC IPv6 suite atk6-alive6 will discover live addresses in the same segment, as shown in the following screenshot:
