Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! Other ways to support HackTricks: * If you want to see your **company advertised in HackTricks** or **download HackTricks in PDF** Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)! * Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) * Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family) * **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.** * **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
### DHCPv6 vs. DHCPv4 Message Types Comparison A comparative view of DHCPv6 and DHCPv4 message types is presented in the table below: | DHCPv6 Message Type | DHCPv4 Message Type | |:-------------------|:-------------------| | Solicit (1) | DHCPDISCOVER | | Advertise (2) | DHCPOFFER | | Request (3), Renew (5), Rebind (6) | DHCPREQUEST | | Reply (7) | DHCPACK / DHCPNAK | | Release (8) | DHCPRELEASE | | Information-Request (11) | DHCPINFORM | | Decline (9) | DHCPDECLINE | | Confirm (4) | none | | Reconfigure (10) | DHCPFORCERENEW | | Relay-Forw (12), Relay-Reply (13) | none | **Detailed Explanation of DHCPv6 Message Types:** 1. **Solicit (1)**: Initiated by a DHCPv6 client to find available servers. 2. **Advertise (2)**: Sent by servers in response to a Solicit, indicating availability for DHCP service. 3. **Request (3)**: Clients use this to request IP addresses or prefixes from a specific server. 4. **Confirm (4)**: Used by a client to verify if the assigned addresses are still valid on the network, typically after a network change. 5. **Renew (5)**: Clients send this to the original server to extend address lifetimes or update configurations. 6. **Rebind (6)**: Sent to any server to extend address lifetimes or update configurations, especially when no response is received to a Renew. 7. **Reply (7)**: Servers use this to provide addresses, configuration parameters, or to acknowledge messages like Release or Decline. 8. **Release (8)**: Clients inform the server to stop using one or more assigned addresses. 9. **Decline (9)**: Sent by clients to report that assigned addresses are in conflict on the network. 10. **Reconfigure (10)**: Servers prompt clients to initiate transactions for new or updated configurations. 11. **Information-Request (11)**: Clients request configuration parameters without IP address assignment. 12. **Relay-Forw (12)**: Relay agents forward messages to servers. 13. **Relay-Repl (13)**: Servers reply to relay agents, who then deliver the message to the client. ## References * [https://support.huawei.com/enterprise/en/doc/EDOC1100306163/d427e938/introduction-to-dhcpv6-messages](https://support.huawei.com/enterprise/en/doc/EDOC1100306163/d427e938/introduction-to-dhcpv6-messages)
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! Other ways to support HackTricks: * If you want to see your **company advertised in HackTricks** or **download HackTricks in PDF** Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)! * Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) * Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family) * **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.** * **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.