Trustwave's John Anderson discussed how attackers can use IPv6 to bypass security protections due to security rules that apply to IPv4 but not IPv6.
You can access the article via the link below:
- nmap
- arp-scan
- python-nmap (https://pypi.org/project/python-nmap/)
- termcolor (https://pypi.org/project/termcolor/)
pip install python-nmap
pip install termcolor
apt-get install arp-scan
python3 ipv4bypass.py -i eth0 -r 10.5.192.0/24
python3 ipv4bypass.py -h
- nmap ipv6 scan result
- nmap ipv4 scan result
- ipv4bypass.py scan result