This IPv6 Toolkit allows you to perform security assessments and trouble-shooting of your IPv6 network. A new version has been released recently.
Introduction
This toolkit is maintained and further developed by SI6 Networks . The philosophy behind the toolkit is to provide an interface between "your ideas and an IPv6 network" as illustrated in the image below:
The main goal of this toolkit it to provide security analysis and trouble-shooting functionality for the IPv6 protocol suite. The toolkit consists of 12 individual tools and supports the latest versions of the following operating systems: Linux, FreeBSD, NetBSD, OpenBSD and MacOS. The toolkit has been released under the GNU General Public License (GPL).
New release
We are pleased to release the SI6 Networks' IPv6 Toolkit v1.3 .1 . On the toolkit side you can find the tarball , a PGP-signed version of the toolkit, a link to the toolkit's GIT repository and other useful information.
This release contains a number of new features:
- It includes a full-fledged IPv6 address scanning tool (scan6) - probably the only comprehensive IPv6 address scanning tool out there.
- It includes support for tunnels (in most of the tools). If you are currently employing a free IPv6 tunnel to connect to the IPv6 Internet, you willl now be able to play with the tools using your tunnel.
- It includes features that have been in our "to do list" for a while:
- Manual pages in troff format for all the tools
- A makefile, to easily build and install the tools, configuration file, manuals, etc., on your local system
Please send any bug reports and/or feature requests to fgont [at] si6networks [dot] com
Fernando Gont presented this toolkit at the IEPG during IETF 85 in Atlanta, US.
The slides
are available on the IEPG web site.
You can get the latest news on IPv6 security research and tools by following us on Twitter: @SI6Networks. You can also join the
ipv6hackers mailing list
where IPv6 security related issues are being discussed.
Comments 0
Comments are disabled on articles published more than a year ago. If you'd like to inform us of any issues, please reach out to us via the contact form here.