Skip to content

k1z1lelma/ipv4bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ipv4bypass

Trustwave's John Anderson discussed how attackers can use IPv6 to bypass security protections due to security rules that apply to IPv4 but not IPv6.

You can access the article via the link below:

Dependences (tested on Kali Linux)

Installation of dependencies

  • pip install python-nmap
  • pip install termcolor
  • apt-get install arp-scan

Usage

  • python3 ipv4bypass.py -i eth0 -r 10.5.192.0/24
  • python3 ipv4bypass.py -h

Screenshoot

  • nmap ipv6 scan result

  • nmap ipv4 scan result

  • ipv4bypass.py scan result

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages