Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ekultek/suddensix
IPV6 MITM attack tool
https://github.com/ekultek/suddensix
Last synced: 3 months ago
JSON representation
IPV6 MITM attack tool
- Host: GitHub
- URL: https://github.com/ekultek/suddensix
- Owner: Ekultek
- License: bsd-2-clause
- Fork: true (CiscoCXSecurity/suddensix)
- Created: 2019-04-11T15:41:05.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2013-08-07T17:33:14.000Z (about 11 years ago)
- Last Synced: 2024-04-24T13:41:53.923Z (6 months ago)
- Language: Shell
- Size: 111 KB
- Stars: 4
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-network-stuff - **0**星
README
suddensix
=========**Overview**
Sudden Six is an automation script for conducting the SLAAC attack outlined in Alec Water's [blog post](http://resources.infosecinstitute.com/slaac-attack/).
This attack can be used to build an IPv6 overlay network on an IPv4 infrastructure to perform man-in-the-middle attacks.The script installs and configures the following packages:
* sipcalc
* tayga
* radvd
* wide-dhcpv6-server
* bind9**Requirements**
This script has been tested on Ubuntu 12.04 LTS and Kali Linux 1.0.x. We suggest using [Wireshark](http://http://www.wireshark.org/) to view the intercepted traffic.**Usage**
Execute the `suddensix.sh` script as the root user. The script will prompt you for the interface to conduct the attack from as well as ask you to specify a free IP address on the local IPv4 network you are attacking.
After the script is running, run Wireshark to view the intercepted traffic.*Note:* The script is not persistent, the attack host will not intercept traffic after a reboot. The script will not work on fully configured IPv6 networks.
For more information check out the [Neohapsis Blog](http://labs.neohapsis.com/2013/07/30/picking-up-the-slaac-with-sudden-six/)
**TODO**
We need help getting the following finished:
* A way to specify MITM target scope
* Automate basic network reconnaissance
* Detect IPv6 countermeasures
* Configure IPv6 tunneling
* Leverage THC-IPv6 tools
* More platformsIf you are intersted in helping, fork the project and submit a pull request with your additions!