[cs615asa] Blue Team Mission Week 5
Ritvik Tiwari
rtiwari2 at stevens.edu
Mon Feb 24 15:35:11 EST 2020
The article talks about how ignoring the default IPv6 configuration can lead to a possible security breach.
https://www.darkreading.com/vulnerabilities---threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993
[https://twimgs.com/nojitter/darkreading/dr-logo.jpg]<https://www.darkreading.com/vulnerabilities---threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993>
Weaponizing IPv6 to Bypass IPv4 Security<https://www.darkreading.com/vulnerabilities---threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993>
Most net sec detection tools rely on v4. This is a great example of how Bro's logging framework can be used to trace the deltas between IPv4 and IPv6.
www.darkreading.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20200224/20ca8e1e/attachment-0001.html>
More information about the cs615asa
mailing list