Rsmurf6 the local network of the victim. Note: this depends on an implementation error, currently only verified on Linux.
It uses a dierent approach. It sends ICMPv6 echo reply packets that are sourced from FF02::1 and destined for remote computers. If the destination system is allowed to respond to packets sourced from a multicast address, the response causes a trac ood on the remote LAN. This attack has stronger amplication, because each packet generated by rsmurf6 can generate large amount of packets on the remote LAN
This form of amplification is particularly dangerous because each packet generated by rsmurf 6 would translate into numerous packets on the remote LAN. Rsmurf6 is like a reverse smurf6 and only works on incorrectly coded implementations of the IPv6 stack. Therefore, it is not as effective as it once was when more vulnerable operating systems were in existence.
rsmur f6 interface victim-ip
[email protected]cyborg:~$ sudo rsmurf6 eth0 fe80::2e0:4cff:fe37:93/64