[LACNIC/Seguridad] SI6 Networks' IPv6 Toolkit v2.0 (Guille) released!

Fernando Gont fgont en si6networks.com
Jue Abr 9 17:01:14 BRT 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Folks,

We are pleased to announce the release of the SI6 Networks' IPv6 Toolkit
v2.0 (Guille): a security assessment and trouble-shooting toolkit for
the IPv6 protocol suite. This version was released during the Troopers
2015 conference at Heidelberg, Germany.

  * Toolkit homepage: <http://www.si6networks.com/tools/ipv6toolkit>.

  * Tarball:
<http://www.si6networks.com/tools/ipv6toolkit/ipv6toolkit-v2.0.tar.gz>

  * GPG Signature:
<http://www.si6networks.com/tools/ipv6toolkit/ipv6toolkit-v2.0.tar.gz.sig>

  * GPG-signed tarball:
<http://www.si6networks.com/tools/ipv6toolkit/ipv6toolkit-v2.0.tar.gz.gpg>


These on-line articles can be a good starting point for some of the new
features:

 *
<http://www.insinuator.net/2015/04/si6-networks-ipv6-toolkit-v2-0-guille-released-at-the-troopers-ipv6-security-summit/>

*
<http://searchsecurity.techtarget.com/tip/How-to-evaluate-IPv6-network-security-with-SI6-Networks-IPv6-Toolkit>



CHANGELOG for SI6 Networks IPv6 Toolkit v2.0 (Guille)

 * path6: New tool
   Added a fully-IPv6-capable traceroute tool, named path6.

 * script6: New tool
   Added a new tool which incorporates new functionality and also
   provides a shortcut to other existing tools.

 * blackhole6: New tool
   Added a new tool isolates IPv6 blackholes.

 * udp6: New tool
   Added a new tool that can send arbirary UDP/IPv6 packets.

 * All: Fix bug when reading packets
   lipcap "internals" together with select() would cause (at times)
   delays when reading packets.

 * All: Add support for Solaris
   Solaris is now a supported platform.

 * All: Fix bug in next hop determination
   A bug caused, in some scenarios, the tools to fail with "cannot find
   next hop".

 * All: Fix support for loopback interface
   The tools failed to set the "virtual" "Ether Proto" for packets sent
   on the loopback interface, and hence they were discarded.

 * All: Add support for domain names
   All tools now support domain names in their "-d" options.

 * addr6: Fix bug in address scope filtering
   A bug caused address scope filters to behave incorrectly.

 * addr6: Fix error in manual page
   Some of the long-option names were incorrect.

 * scan6: Fixes bug in address range computation
   Prefixes that were not multiple of 16 resulted in bogus address
   ranges.

 * scan6: Add support for port scanning
   scan6 now implements several techniques for TCP and UDP port
   scanning.

 * scan6: Add support for heuristic host scanning
   scan6 can now automatically infer the IID type of a target and reduce
   the search space accordingly (just "-d example.com/64" or
   "-d IPV6ADDRESS/64".

 * tcp6: Add TCP probe mode
   Probe mode allows you to employ tcp6 for simple probing (e.g.,
   port scanning)

 * tcp6: Add "--open-mode" and "--close-mode" options
   These two options allow you to cause a TCP connection at a remote
   node to transition to any specific state (and hene perform e.g.,
   FIN-WAIT-2 floods)

 * tcp6: Add "--data" option
   This options allows to set a specific TCP payload from the
   command-line (e.g., an HTTP "GET" command).

 * script6: Fix bug in get-aaaa, get-ns, and get-mx
   Domains that had a CNAME would be skipped.

 * frag6: Fix bug in Frag ID assessment
   Probes are now sent every 10ms rather than in batches, to minimize
   packet
   reordering.


Please send any bug reports and/or feature requests to
<fgont en si6networks.com>.

Thanks!

Best regards,
- -- 
Fernando Gont
SI6 Networks
e-mail: fgont en si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492





-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=s2IB
-----END PGP SIGNATURE-----



Más información sobre la lista de distribución Seguridad