KringleCon 4: Four Calling Birds WriteUp - IPv6
Posted: Jan 12, 2022 | ~ 1 min read time#ctf #kringlecon-2021 #network
Side Quest: IPv6 Investigation
The methodology used for IPv4 will be the same for IPv6 - we just need to figure out the right tools.
Step 1: Enumerate hosts that are “up”
Normally, I would just run nmap
across the subnet as a ping sweep across the subnet. However, with IPv6, the subnets are gigantic are scannin all available IP space is not realistic. So I checked the other available tools and noticed you can use ping6
to interrogate the all nodes multicast
address to see live IPs on a subnet. An awesome in-depth explanation of IPv6 scanning can be found here.
Step 2: Scan “up” hosts for open ports
Now that I got a list of live hosts, I then was able to use nmap
to scan for open ports.
Step 3: Access available hosts via the open ports and profit
Since we have curl
available to use, I focused on host #4 first and investigated port 80.
From there, I was able to run netcat
against port 9000 and find the flag:
To see my other writeups for this CTF, check out the tag #kringlecon-2021.