mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-22 19:13:39 +00:00
69 lines
4.4 KiB
Markdown
69 lines
4.4 KiB
Markdown
|
|
|
|
{% hint style="success" %}
|
|
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|
|
|
<details>
|
|
|
|
<summary>Support HackTricks</summary>
|
|
|
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
|
|
|
</details>
|
|
{% endhint %}
|
|
|
|
### DHCPv6 vs. DHCPv4 Message Types Comparison
|
|
A comparative view of DHCPv6 and DHCPv4 message types is presented in the table below:
|
|
|
|
| DHCPv6 Message Type | DHCPv4 Message Type |
|
|
|:-------------------|:-------------------|
|
|
| Solicit (1) | DHCPDISCOVER |
|
|
| Advertise (2) | DHCPOFFER |
|
|
| Request (3), Renew (5), Rebind (6) | DHCPREQUEST |
|
|
| Reply (7) | DHCPACK / DHCPNAK |
|
|
| Release (8) | DHCPRELEASE |
|
|
| Information-Request (11) | DHCPINFORM |
|
|
| Decline (9) | DHCPDECLINE |
|
|
| Confirm (4) | none |
|
|
| Reconfigure (10) | DHCPFORCERENEW |
|
|
| Relay-Forw (12), Relay-Reply (13) | none |
|
|
|
|
**Detailed Explanation of DHCPv6 Message Types:**
|
|
|
|
1. **Solicit (1)**: Initiated by a DHCPv6 client to find available servers.
|
|
2. **Advertise (2)**: Sent by servers in response to a Solicit, indicating availability for DHCP service.
|
|
3. **Request (3)**: Clients use this to request IP addresses or prefixes from a specific server.
|
|
4. **Confirm (4)**: Used by a client to verify if the assigned addresses are still valid on the network, typically after a network change.
|
|
5. **Renew (5)**: Clients send this to the original server to extend address lifetimes or update configurations.
|
|
6. **Rebind (6)**: Sent to any server to extend address lifetimes or update configurations, especially when no response is received to a Renew.
|
|
7. **Reply (7)**: Servers use this to provide addresses, configuration parameters, or to acknowledge messages like Release or Decline.
|
|
8. **Release (8)**: Clients inform the server to stop using one or more assigned addresses.
|
|
9. **Decline (9)**: Sent by clients to report that assigned addresses are in conflict on the network.
|
|
10. **Reconfigure (10)**: Servers prompt clients to initiate transactions for new or updated configurations.
|
|
11. **Information-Request (11)**: Clients request configuration parameters without IP address assignment.
|
|
12. **Relay-Forw (12)**: Relay agents forward messages to servers.
|
|
13. **Relay-Repl (13)**: Servers reply to relay agents, who then deliver the message to the client.
|
|
|
|
## References
|
|
* [https://support.huawei.com/enterprise/en/doc/EDOC1100306163/d427e938/introduction-to-dhcpv6-messages](https://support.huawei.com/enterprise/en/doc/EDOC1100306163/d427e938/introduction-to-dhcpv6-messages)
|
|
|
|
|
|
{% hint style="success" %}
|
|
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|
|
|
<details>
|
|
|
|
<summary>Support HackTricks</summary>
|
|
|
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
|
|
|
</details>
|
|
{% endhint %}
|
|
|
|
|