6Guard is a honeypot-based IPv6 attack detector aiming at detecting the link-local level attacks, especially when the port-mirror feature of switch is unavailable.
apt-get install python-scapy
)$ sudo ./conf_generator.py
to generate the configuration files.$ sudo ./6guard.py
.Note:
The ./conf
directory stores the configuration files of the honeypots and the globalpot.
The ./log
directory stores the operation logs and the attacking records.
The ./pcap
directory stores the message-related packets that can be reviewed in Wireshark.
6Guard is able to detect most attacks initiated by THC-IPv6 and the advanced IPv6 host discovery methods utilized by Nmap. In practical terms, this beta version could detect the attacks as below:
Group I of THC-IPv6. Fake Router Advertisement or Redirect ICMPv6
Group II of THC-IPv6. Fake Neighbour Solicitation/Advertisement
Group III of THC-IPv6. Fake DHCPv6/DNS Server or Client
Group IV of THC-IPv6. Evil Consumer For Network resource or CPU resource
Advanced IPv6 host discovery utilized by Nmap
6Guard is based on Python and Scapy. Basically, it contains the three modules: honeypot, globalpot and event analysis.
The honeypot is a virtual low-interaction IPv6 host with the capability of NDP and StateLess Address Auto-Configuration. Consequently, it is responsible for detecting the unicast attacks.
The globalpot is a module focusing on detecting the multicast attacks. Since each honeypot would be able to capture the multicast attacks at the same time, then implementing the feature as a globalpot would simplify the detection significantly.
The event analysis module is responsible for analyzing the Event messages and generating an Attack message if detected. Such mechanism is useful for detecting attacks like dos-new-ip6: when one honeypot reported an Event message that the address was in use, it might be true, but if more honeypots reported the address-in-use message, we could know that the network was suffering dos-new-ip6 attack.
Consequently, the Attack messages comes from the honeypots, the globalpot and the event analysis module.
Attacking information:
Detected Attack message:
Attacking information:
Detected Attack message:
Attacking information:
Detected Event messsage 1:
Detected Event messsage 2:
Detected Attack message: