SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOver the next years to come IPv6 will eventually replace IPv4 in private and public networks. This paper attempts to describe upcoming challenges and limitations as well as new methods of OS fingerprinting with the shift to IPv6. This includes performing network scans and finding live hosts to fingerprint. The focus of this paper will be on describing the changes made within the protocol headers in IPv6 and the consequences for OS fingerprinting. This covers known fingerprinting method with new IPv6 header fields and new methods of OS fingerprinting enabled with the IPv6 protocol. Protocol examinations also include IPv6 extension headers introduced with IPv6. Current fingerprinting and scanning tools will be listed and checked for IPv6 fingerprinting support. Finally, possible countermeasures to prevent OS fingerprinting on IPv6 protocol level will be mentioned.