Folks,
Short version of the story: It seems that not that long ago I introduced
a bug in the toolkit, so if you were trying to exploit the IPv6 "ping of
death" attack with the "--pod-attack" option of the frag6 tool, this
could have been the reason it was not working as expected.
I've posted an update of the toolkit (v1.4.1) at:
<
http://www.si6networks.com/tools/ipv6toolkit/> (simple tarball and
gpg-signed tarball)....or just clone the git repository.
Now, you may want to try the IPv6 "ping of death" as:
# frag6 -i INTERFACE -d TARGET --pod-attack
Note: I've not tried it against Windows, yet... and since I've been up
coding for the last 36 hours, I'm hoping that by the time I wake up
again someone has some results to share (talk about community ;-) ).
Thanks!
Cheers,
--
Fernando Gont
SI6 Networks
e-mail:
fg...@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
_______________________________________________
Ipv6hackers mailing list
Ipv6h...@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers