Modified Files:

Linux+IPv6-HOWTO.lyx : add info about nmap/IPv6
This commit is contained in:
pbldp 2002-07-13 14:02:46 +00:00
parent 00b773c4a7
commit b45958eb43
1 changed files with 99 additions and 8 deletions

View File

@ -51,8 +51,8 @@ on>
<revhistory>
\layout SGML
<revision> <revnumber>Release 0.26</revnumber> <date>2002-07-13</date> <authorini
tials>PB</authorinitials> <revremark>See
<revision> <revnumber>Release 0.26.1</revnumber> <date>2002-07-13</date> <authorin
itials>PB</authorinitials> <revremark>See
\begin_inset LatexCommand \ref[revision history]{revision-history}
\end_inset
@ -7183,16 +7183,11 @@ IPv6 security auditing
Currently there are no comfortable tools out which are able to check a system
over network for IPv6 security issues.
Neither
\begin_inset LatexCommand \url[NMap]{http://www.insecure.org/nmap/}
\end_inset
nor
\begin_inset LatexCommand \url[Nessus]{http://www.nessus.org/}
\end_inset
or any commercial security scanner is as far as I know able to scan IPv6
nor any commercial security scanner is as far as I know able to scan IPv6
addresses.
\layout Subsection
@ -7225,6 +7220,99 @@ With the IPv6-enabled netcat (see
13 JUL 2002 11:22:22 CEST
\layout Subsection
Security auditing using IPv6-enabled nmap
\layout Standard
\begin_inset LatexCommand \url[NMap]{http://www.insecure.org/nmap/}
\end_inset
, one of the best portscaner around the world, is currently not IPv6-enabled
out of the box, but there is a patch available (see
\begin_inset LatexCommand \url[IPv6+Linux-status-apps/security-auditing]{http://www.bieringer.de/linux/IPv6/status/IPv6+Linux-status-apps.html#security-auditing}
\end_inset
for more).
Usage example:
\layout Code
# nmap
\series bold
-6
\series default
-sS
\series bold
-P0
\series default
::1
\layout Code
Starting nmap V.
2.54BETA37 ( www.insecure.org/nmap/ )
\layout Code
Interesting ports on localhost6 (::1):
\layout Code
(The 1597 ports scanned but not shown below are in state: closed)
\layout Code
Port State Service
\layout Code
22/tcp open ssh
\layout Code
53/tcp open domain
\layout Code
515/tcp open printer
\layout Code
2401/tcp open cvspserver
\layout Code
Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds
\layout Standard
Note: the patch isn't really finished yet, you need at least option
\begin_inset Quotes sld
\end_inset
-P0
\begin_inset Quotes srd
\end_inset
or may not use
\begin_inset Quotes sld
\end_inset
-O
\begin_inset Quotes srd
\end_inset
, otherwise you get such strange error message:
\layout Code
# nmap -6 -sS -P0 -O ::1
\layout Code
Starting nmap V.
2.54BETA37 ( www.insecure.org/nmap/ )
\layout Code
sendto in send_tcp_raw6: sendto(4, packet, 60, 0, ::1, 28) => Invalid argument
\layout Code
Sleeping 15 seconds then retrying
\layout Code
caught SIGINT signal, cleaning up
\layout Subsection
Security auditing using IPv6-enabled strobe
\layout Standard
@ -10287,6 +10375,9 @@ Versions x.y.z are work-in-progress and only published as LyX file on CVS.
Releases 0.x
\layout Description
0.26.1 2002-07-13/PB: Update nmap/IPv6 information
\layout Description
0.26 2002-07-13/PB: Fill /proc-filesystem chapter, update DNS information
about depricated A6/DNAME, change P-t-P tunnel setup to use of
\begin_inset Quotes sld