ipv4Bypass: Using IPv6 to Bypass Security

ipv4Bypass

Using IPv6 to Bypass Security

how the tool works

1) Sends an ICMP echo request (ping6 ff02::1%eth0) to the broadcast address (ff02::1), all IPv6 hosts in the local network will reply
2) Sends an ARP requests to all IPv4 hosts in the local network
3) Performs a port scan of all IPv4 and IPv6 hosts that are alive in the local network
4) Match the IPv6 address to the IPv4 address based on the MAC address information.
5) Checks to see if the scan against the IPv6 address on the host returns more open ports that the IPv4 address on the same host and outputs the difference in ports (if any)

See here for an explanation of the technique.

Download

git clone https://github.com/milo2012/ipv4Bypass.git

Use

$ python bypass.py -i eth0 -r 10.5.192.0/24  


$ python bypass.py -h
Usage: bypass.py [options]

Options:
-h, --help show this help message and exit
-i INTERFACENO Network interface (e.g. eth0)
-r IPRANGE Local network IP range (e.g. 192.168.0.1/24)

 

ipv4Bypass

Source: https://github.com/milo2012/