Skip to content

Latest commit

 

History

History
36 lines (23 loc) · 1 KB

README.md

File metadata and controls

36 lines (23 loc) · 1 KB

ipv4bypass

Trustwave's John Anderson discussed how attackers can use IPv6 to bypass security protections due to security rules that apply to IPv4 but not IPv6.

You can access the article via the link below:

Dependences (tested on Kali Linux)

Installation of dependencies

  • pip install python-nmap
  • pip install termcolor
  • apt-get install arp-scan

Usage

  • python3 ipv4bypass.py -i eth0 -r 10.5.192.0/24
  • python3 ipv4bypass.py -h

Screenshoot

  • nmap ipv6 scan result

  • nmap ipv4 scan result

  • ipv4bypass.py scan result