Network Toolkit for exploiting Internet Protocol version 6 Security Vulnerabilities
but.event.date | 25.04.2023 | cs |
but.event.title | STUDENT EEICT 2023 | cs |
dc.contributor.author | Anh Phan, Viet | |
dc.contributor.author | Jeřábek, Jan | |
dc.date.accessioned | 2023-07-17T05:57:34Z | |
dc.date.available | 2023-07-17T05:57:34Z | |
dc.date.issued | 2023 | cs |
dc.description.abstract | This work has developed a network toolkit inPython to automatically carry out several network attacks andsecurity vulnerability testing when operating IPv6. Specifically,the program can be used to launch specified practical typesof attacks according to the user’s direction such as DoS(Denial of Service), dumping servers, spoofing or bypassing thefirewall. The essence of these attacks is based on the inherentvulnerabilities of Extension headers, and protocols such asICMPv6 (Internet Control Message Protocol), DHCPv6 (DynamicHost Configuration) Protocol, which are the most importantprotocols in the IPv6 network operation. In addition, the analysisand illustrations have been presented, which can help networkanalysts to have a clearer understanding of the potential dangersthat could arise from implementation of IPv6. From there,they can propose appropriate solutions to eliminate or mitigatedamage when attacks occur. | en |
dc.format | text | cs |
dc.format.extent | 125-128 | cs |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Proceedings II of the 29st Conference STUDENT EEICT 2023: Selected papers. s. 125-128. ISBN 978-80-214-6154-3 | cs |
dc.identifier.doi | 10.13164/eeict.2023.125 | |
dc.identifier.isbn | 978-80-214-6154-3 | |
dc.identifier.issn | 2788-1334 | |
dc.identifier.uri | http://hdl.handle.net/11012/210672 | |
dc.language.iso | en | cs |
dc.publisher | Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologií | cs |
dc.relation.ispartof | Proceedings II of the 29st Conference STUDENT EEICT 2023: Selected papers | en |
dc.relation.uri | https://www.eeict.cz/eeict_download/archiv/sborniky/EEICT_2023_sbornik_2_v2.pdf | cs |
dc.rights | © Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologií | cs |
dc.rights.access | openAccess | en |
dc.subject | IPv6 | en |
dc.subject | ICMPv6 | en |
dc.subject | Toolkit | en |
dc.subject | Network security,Attack | en |
dc.subject | Python | en |
dc.subject | Kali Linux | en |
dc.subject | Scapy | en |
dc.title | Network Toolkit for exploiting Internet Protocol version 6 Security Vulnerabilities | en |
dc.type.driver | conferenceObject | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.affiliatedInstitution.department | Fakulta elektrotechniky a komunikačních technologií | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 125_EEICT_selected.pdf
- Size:
- 1.06 MB
- Format:
- Adobe Portable Document Format
- Description: