Metasploit mailing list archives
Experimental support for IPv6
From: hdm at metasploit.com (H D Moore)
Date: Sun, 29 Apr 2007 18:48:20 -0500
The development version (trunk) of Metasploit 3 now supports IPv6 sockets. All auxiliary and exploit modules should now support IPv6 addresses if the host system supports AF_INET6. The catch is that until we have IPv6-aware payloads (bind/reverse/etc), the exploits will not be that useful on IPv6 networks. Payloads like "adduser" will work, but all of the standard "remote shell" modules are hardcoded for IPv4 sockets. If testing goes well, IPv6 support will be merged into the next major release (3.1). -HD -- example --- # Choose the HTTP version scanning module msf > use auxiliary/scanner/http/version # Target the /120 where www.ipv6experiment.com lives msf auxiliary(version) > set RHOSTS 2001:4978:1:110:0:ac:ce55:1b1e/120 RHOSTS => 2001:4978:1:110:0:ac:ce55:1b1e/120 # Run the module msf auxiliary(version) > run [*] 2001:4978:0001:0110:0000:00ac:ce55:1b1e is running lighttpd/1.4.13 [*] Auxiliary module execution completed
Current thread:
- Experimental support for IPv6 H D Moore (Apr 29)