Using IPv6 to Bypass Security (tool)

June 22, 2018 Leave a comment

John Anderson from Trustwave wrote an interesting post on Trustwave SpiderLabs blog (link at end of this post).

In the article, an attacker was able to use IPv6 to bypass security protections that was in place for iPv4 but not IPv6.

The number of open ports on the IPv6 and IPv4 addresses on the same host are different.

Below is a walkthrough of how to perform the technique.

1) Sends an ICMP echo request (ping6 ff02::1%eth0) to the broadcast address (ff02::1) , all IPv6 hosts in the local network will reply
2) Sends an ARP requests to all IPv4 hosts in the local network
3) Performs a port scan of all IPv4 and IPv6 hosts that are alive in the local network
4) Match the IPv6 address to the IPv4 address based on the MAC address information.
5) Checks to see if the scan against the IPv6 address on the host returns more open ports that the IPv4 address on the same host and outputs the difference in ports (if any)

I wrote a simple script to make the testing for this easier by automating these steps so that we can focus on more important testing.

Below is a screenshot of how the tool looks like when it runs.

In the screenshot below (in the last few lines), TCP ports 22, 111 and 8080 were accessible on the IPv6 interface of the host ( | fe80::250:56ff:fe97:7a3b) but not on the IPv4 interface.

The next step would be to fingerprint the services running on the IPv6 interface, test for default or weak accounts (SSH), look for vulnerabilities and so on. You might just get lucky.

You can find the tool in the below Github link


Below are some useful articles that are related—threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993


(CVE-2018-0296) Script to extract usernames from Cisco ASA devices

June 21, 2018 Leave a comment

I wrote a simple script to extract usernames from Cisco ASA devices if they are vulnerable to CVE-2018-0296.

You can check out this blog post for more technical details.

Screen Shot 2018-06-21 at 5.04.44 PM

This script would be useful instead of doing it manually.

However, there are easier ways to get usernames belonging to an organization.

The script is available at

Categories: Uncategorized

pathBrute – yet another dirbuster alternative

April 21, 2018 Leave a comment

pathBrute is yet another dirbuster alternative.

It’s written in Go so it’s blazing fast.

pathBrute contains/uses a number of self compiled wordlists for identifying “interesting” content and potentially vulnerable websites.
1) 13925 URI paths from Exploit-Database (increasing regularly)
2) URI paths from Metasploit Framework

pathBrute can also use wordlists from other sources if you prefer.

pathBrute can also be used for identifying if any type of CMS (Joomla, WordPress and Drupal) is running on the target websites and fingerprint the versions of the CMS using the –cms option.

Binaries for different platforms and architectures are available in the the below Github project’s release section.

pathBrute is also available as a docket container.

I hope this tool will come in handy to you as it is to me.

The tool can be downloaded from

Categories: Uncategorized

Enumerating Domains of Specific Organisations

December 21, 2017 Leave a comment

My friend Paul wrote a tweet about a useful tip on how to enumerate the domains of a specific organization using curl.

Do follow him at @PaulWebSec if you haven’t.

I decided to expand on his tip.  It might be sometimes hard to find out the full organization name but you do know the domain name that they use (or maybe I am just lazy)

Below is the script that I wrote.  You only need to provide the domain name that the organization is using.    Please see the below example.

$ python -h

Usage: [options]
  -h, –help  show this help message and exit
  -t THREADS  number of threads
  -n DOMAIN   domain name
  -r          resolve DNS name

Below is an example of the script running against

$ python -n -t 20 -r
[*] Found the below organization names
TechCrunch, Inc., TechCrunch

[*] Found the below domains
——– redacted for brevity ——–

[*] Results
—————————-  ——————————————-    ,    ,,,      ,     ,      ,

——– redacted for brevity ——–


The script can be downloaded from

Categories: Uncategorized

Punycode Phishing Domains Generator

November 9, 2017 Leave a comment

I wrote a simple script that can generate Pnnycode domain names that I can use during phishing tests.
The issue with Punycode is that an attacker can create a spoof website with a URL that looks exactly the same like the real website.  It relies on the way that many browsers interpret punycode.

Firefox and Safari seems to be vulnerable to punycode phishing attack currently.

There are around 80 similar looking domains being generated by the script.

$ python -d []
unï [available]
unì [available]
uní [available]
uniqlö.com [available]
uniqlò.com [available]
uniqló.com [available]
ü [available]
ù [available]
ú [available] []
unïqlö.com [available]
unïqlò.com [available]
unïqló.com [available]
ünï [available]
ùnï [available]
únï [available]
unï [available]
unìqlö.com [available]
unìqlò.com [available]
unìqló.com [available]
ünì [available]
ùnì [available]
únì [available]
unì [available]
uníqlö.com [available]
uníqlò.com [available]
uníqló.com [available]
üní [available]
ùní [available]
úní [available]
uní [available]
üniqlö.com [available]
ùniqlö.com [available]
úniqlö.com [available]
üniqlò.com [available]
ùniqlò.com [available]
úniqlò.com [available]
üniqló.com [available]
ùniqló.com [available]
úniqló.com [available]
ü [available]
ù [available]
ú [available]
ünïqlö.com [available]
ùnïqlö.com [available]
únïqlö.com [available]
ünïqlò.com [available]
ùnïqlò.com [available]
únïqlò.com [available]
ünïqló.com [available]
ùnïqló.com [available]
únïqló.com [available]
ünï [available]
ùnï [available]
únï [available]
ünìqlö.com [available]
ùnìqlö.com [available]
únìqlö.com [available]
ünìqlò.com [available]
ùnìqlò.com [available]
únìqlò.com [available]
ünìqló.com [available]
ùnìqló.com [available]
únìqló.com [available]
ünì [available]
ùnì [available]
únì [available]
üníqlö.com [available]
ùníqlö.com [available]
úníqlö.com [available]
üníqlò.com [available]
ùníqlò.com [available]
úníqlò.com [available]
üníqló.com [available]
ùníqló.com [available]
úníqló.com [available]
üní [available]
ùní [available]
úní [available]

The domain on the left column is how the domain will appear in the browser’s location bar.
The domain on the right column is the domain to use/register.
If the domain is already in use, the IP address will appear next to the domain in the output above.

I hope this can be useful to some of you during your phishing tests.

The link to the source code is available at

Below are some references to phishing with punycode.
Phishing with ‘punycode’ – when foreign letters spell English words

Categories: Uncategorized

Jumping from Corporate to Compromising Semi-Isolated Network

September 21, 2017 1 comment

Finding and attacking hosts in Semi-Isolated networks
The new script ‘hopandhack‘ can be used by attackers to automatically find and hunt down hosts that are not directly accessible from the attacker’s machine.  In some organizations, IT administrators have to use something called a ‘jump box’ or VPN to access the secure data centre or PCI network where sensitive data are stored .

The ‘hopandhack’ script automates the process of finding hosts with the necessary routes to these secure network and compromises them.  The functionality of hopandhack will be incorporated into Portia in the next week or so.

hopandhack script can be found at under the filename ‘’.

Basic Workflow of how the attack works.

Below is a video demo as presented at Rootcon (2017).  In the video, the attacker is able to access one host (host A) but not the other host (host B) thats in the secure network.

Host A has an active route to host B.  In order to compromise host B, the attacker has to setup a relay from host A to host B and then use this relay to dump credentials/hashes from host B.

More functionalities will be added in future.

The tool is currently available as a standalone tool and its functionalities will be ported over to Portia in the following week.

The slides from Rootcon 2017 is available at

Portia GitHub link

July 30, 2017 Leave a comment

Below is the updated GitHub link for Portia

Categories: Uncategorized