SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIPv4 has been exhausted in recent months, and sooner or later, IPv6 will be fully utilized on the Internet. The use of IPv6 will pose new vulnerabilities which will be exploited by attackers for breaking into networks. Those vulnerabilities can come from the application right up to the network level.There are already some works on IPv6 hacking and security. Some of them discuss the remote exploitation of vulnerabilities while others discuss the vulnerabilities of IPv6 itself. This paper intends to provide complete guidance related to IPv6 attacks and defenses. It starts with a brief overview of IPv6. Then, it discusses IPv6 reconnaissance, enumeration, and scanning techniques. The next part gives examples of developing IPv6 remote exploits, thus exploiting IPv6 weaknesses. Brief defensive techniques are also provided at the end of each technique. Those approaches are used in order to give a nearly complete view of IPv6 security.