Network Toolkit for exploiting Internet Protocol version 6 Security Vulnerabilities

but.event.date25.04.2023cs
but.event.titleSTUDENT EEICT 2023cs
dc.contributor.authorAnh Phan, Viet
dc.contributor.authorJeřábek, Jan
dc.date.accessioned2023-07-17T05:57:34Z
dc.date.available2023-07-17T05:57:34Z
dc.date.issued2023cs
dc.description.abstractThis work has developed a network toolkit inPython to automatically carry out several network attacks andsecurity vulnerability testing when operating IPv6. Specifically,the program can be used to launch specified practical typesof attacks according to the user’s direction such as DoS(Denial of Service), dumping servers, spoofing or bypassing thefirewall. The essence of these attacks is based on the inherentvulnerabilities of Extension headers, and protocols such asICMPv6 (Internet Control Message Protocol), DHCPv6 (DynamicHost Configuration) Protocol, which are the most importantprotocols in the IPv6 network operation. In addition, the analysisand illustrations have been presented, which can help networkanalysts to have a clearer understanding of the potential dangersthat could arise from implementation of IPv6. From there,they can propose appropriate solutions to eliminate or mitigatedamage when attacks occur.en
dc.formattextcs
dc.format.extent125-128cs
dc.format.mimetypeapplication/pdfen
dc.identifier.citationProceedings II of the 29st Conference STUDENT EEICT 2023: Selected papers. s. 125-128. ISBN 978-80-214-6154-3cs
dc.identifier.doi10.13164/eeict.2023.125
dc.identifier.isbn978-80-214-6154-3
dc.identifier.issn2788-1334
dc.identifier.urihttp://hdl.handle.net/11012/210672
dc.language.isoencs
dc.publisherVysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.relation.ispartofProceedings II of the 29st Conference STUDENT EEICT 2023: Selected papersen
dc.relation.urihttps://www.eeict.cz/eeict_download/archiv/sborniky/EEICT_2023_sbornik_2_v2.pdfcs
dc.rights© Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.rights.accessopenAccessen
dc.subjectIPv6en
dc.subjectICMPv6en
dc.subjectToolkiten
dc.subjectNetwork security,Attacken
dc.subjectPythonen
dc.subjectKali Linuxen
dc.subjectScapyen
dc.titleNetwork Toolkit for exploiting Internet Protocol version 6 Security Vulnerabilitiesen
dc.type.driverconferenceObjecten
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.affiliatedInstitution.departmentFakulta elektrotechniky a komunikačních technologiícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
125_EEICT_selected.pdf
Size:
1.06 MB
Format:
Adobe Portable Document Format
Description: