[cs615asa] Blue Team Mission Week 5

Ritvik Tiwari rtiwari2 at stevens.edu
Mon Feb 24 15:35:11 EST 2020


The article talks about how ignoring the default IPv6 configuration can lead to a possible security breach.

https://www.darkreading.com/vulnerabilities---threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993
[https://twimgs.com/nojitter/darkreading/dr-logo.jpg]<https://www.darkreading.com/vulnerabilities---threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993>
Weaponizing IPv6 to Bypass IPv4 Security<https://www.darkreading.com/vulnerabilities---threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993>
Most net sec detection tools rely on v4. This is a great example of how Bro's logging framework can be used to trace the deltas between IPv4 and IPv6.
www.darkreading.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20200224/20ca8e1e/attachment-0001.html>


More information about the cs615asa mailing list