Talk With an Expert

A Complete Guide on IPv6 Attack and Defense

A Complete Guide on IPv6 Attack and Defense (PDF, 5.69MB)Published: 19 Mar, 2012
Created by
Atik Pilihanto

IPv4 has been exhausted in recent months, and sooner or later, IPv6 will be fully utilized on the Internet. The use of IPv6 will pose new vulnerabilities which will be exploited by attackers for breaking into networks. Those vulnerabilities can come from the application right up to the network level.There are already some works on IPv6 hacking and security. Some of them discuss the remote exploitation of vulnerabilities while others discuss the vulnerabilities of IPv6 itself. This paper intends to provide complete guidance related to IPv6 attacks and defenses. It starts with a brief overview of IPv6. Then, it discusses IPv6 reconnaissance, enumeration, and scanning techniques. The next part gives examples of developing IPv6 remote exploits, thus exploiting IPv6 weaknesses. Brief defensive techniques are also provided at the end of each technique. Those approaches are used in order to give a nearly complete view of IPv6 security.