HackDig : Dig high-quality web security articles for hackers

Windows “Ping of Death” bug revealed – patch now!

byPaul DucklinEvery time that critical patches come out for any operating system, device or app that we think you might be using, you can predict in advance what we’re going to say.Patch early, patch often.After all, why risk letting the crooks sneak in front of you when you could take a resolute stride ahead of them?Well, this month, the Offensive Sec
Publish At:2020-10-13 22:06 | Read:421 | Comments:0 | Tags:Microsoft Vulnerability CVE-2020-16899 Exploit IPv6 Patch Tu

A Brief History of the IPv4 Address Space

This is meant to be the first part of a 3-part series discussing the space & types of IP addresses, with a particular focus on what has changed between IPv4 and IPv6. In this first post I’ll take the audience through a historical tour of some developments within the IPv4 address space. In a second part I’ll discuss the properties of differen
Publish At:2019-09-19 17:15 | Read:1113 | Comments:0 | Tags:Building IPv6

Exclusive: MalwareMustDie spotted a new IoT Linux/IRCTelnet malware made in Italy

Exclusive: The security researcher MalwareMustDie has found a new Linux/IRCTelnet malware– made in Italy – that aims IoT botnet connected by IRC and Telnet. It is able to generate an IPv6 DDoS and performing NEW dangerous capabilities that Mirai was unable to cover. In  a brief interview to Security Affairs @unixfreakjp of MalwareMustDie group e
Publish At:2016-10-29 19:35 | Read:4151 | Comments:0 | Tags:Breaking News Cyber Crime Malware DDoS Hacking IoT IPv6 Linu

Follow-Up on CVE-2016-1409 – IPv6 NDP DoS Vulnerability

This is a guest post from Jed Kafetz. After seeing Christopher’s post I decided to create a proof using GNS3 and Virtualbox. The aim is to perform the exact attacking using Antonios Atlasis’ Chiron tools and run a Wireshark packet capture to prove the hop limit drops below 255. The following topology is used in GNS3: The routers used are Cisco C372 and the
Publish At:2016-08-21 23:25 | Read:4366 | Comments:0 | Tags:Uncategorized IPv6 Vulnerability

IPv6 & Threat Intelligence

Tomorrow, I will join a meeting where I’m expected to contribute, amongst others, to a discussion on the impact of IPv6 on threat intelligence. To prepare for that I started putting together some thoughts & ideas on the topic, and I even thought I might share this in a post (the one you read right now ;-), not least to, maybe, stimulate a discussio
Publish At:2016-06-02 23:25 | Read:3359 | Comments:0 | Tags:Uncategorized IPv6

CVE-2016-1409 – IPv6 NDP DoS Vulnerability in Cisco Software

Dear readers, As you may have already noticed, Cisco released an urgent security advisory describing an IPv6 Neighbor Discovery DoS Vulnerability in several flavors of Cisco’s operating systems. Currently IOS-XR, XE and NX-OS are affected while ASA and “classic” IOS are under investigation. At first glance, it might look like yet another IPv6 DoS vulnerabili
Publish At:2016-05-30 22:25 | Read:5113 | Comments:0 | Tags:ERNW Insecurity Security IPv6 network Vulnerability

The Beauty of IPv6 Link-Local Addressing. Not

In November 2014, after quite some controversy in the IETF OPSEC working group (for those interested look at the archives), the Informational RFC 7404 “Using Only Link-Local Addressing inside an IPv6 Network” was published. It is authored by Michael Behringer and Eric Vyncke and discusses the advantages & disadvantages of an approach using &#
Publish At:2016-05-28 15:40 | Read:6822 | Comments:0 | Tags:Conferences ERNW Security IPv6 RIPE

Building a secure and reliable IPv6 Guest Wi-Fi Network by Christopher Werny

Christopher Werny leads the network security team for ERNW and since 2005 he is involved in numerous IPv6 projects where he is responsible for planning, implementation and troubleshooting existing projects. The first topic he approached was “How to build a conference WLAN Network in General”. The very first suggestion was to put it to the 5GHz channel becaus
Publish At:2016-04-07 06:40 | Read:3953 | Comments:0 | Tags:TROOPERS IPv6 TR16

Advanced IPv6 Network Reconnaissance

Fernando Gont, who is specializing in the field of communications protocols security, gave a talk during this year’s Troopers IPv6 summit. He spoke about network reconnaissance techniques in IPv6 area and presented a brand new set of tools for this purpose. Comparing with methods for IPv4, reconnaissance techniques for IPv6 should be different. It off
Publish At:2016-04-07 06:40 | Read:3938 | Comments:0 | Tags:Uncategorized IPv6 talks Tools


Right now, I’m in Buenos Aires for IETF95 where, amongst others, an Internet-Draft authored by Eric Vyncke, Antonios Atlasis and myself will be presented (and hopefully discussed) in two working groups. In the following I want to quickly lay out why we think this is an important contribution. As some of you may remember about two years ago we started
Publish At:2016-04-07 06:40 | Read:3027 | Comments:0 | Tags:Uncategorized IPv6 MLD

Anonymization IPv6 in PCAPs – Challenges and Wins

Jasper Bongertz is a Senior Technical Consultant at Airbus Defence and Space CyberSecurity. He is focusing on IT security, Incident Response and Network Forensics. During the IPv6 summit on Troopers16 he had given a talk on anonymization IPv6 in PCAPs and presented his new tool. Sometimes you need to share your packet capture files (PCAPs), but distributing
Publish At:2016-04-07 06:40 | Read:3767 | Comments:0 | Tags:TROOPERS IPv6 pcap talks

Security Assessment of Microsoft DirectAccess

A talk about DirectAccess (an IPv6-only VPN solution) was given by our colleague Ali Hardudi during IPv6 summit. Ali has recently finished his master thesis on this topic. The DirectAccess VPN technology was introduced by Microsoft starting from Windows server 2008. It allows users remotely, seamlessly and securely connect to their internal network resource
Publish At:2016-04-07 06:40 | Read:3233 | Comments:0 | Tags:TROOPERS IPv6 talks

Using IPv6 with Linux? You’ve likely been visited by Shodan and other scanners

One of the benefits of the next-generation Internet protocol known as IPv6 is the enhanced privacy it offers over its IPv4 predecessor. With a staggering 2128 (or about 3.4×1038) theoretical addresses available, its IP pool is immune to the types of systematic scans that criminal hackers and researchers routinely perform to locate vulnerable devices and netw
Publish At:2016-02-02 03:05 | Read:4895 | Comments:0 | Tags:Risk Assessment Technology Lab IPv6 network scanning network

EvilFOCA – Network Attack Toolkit

Evil Foca is a network attack toolkit for penetration testing professionals and security auditors whose purpose it is to test security in IPv4 and IPv6 data networks.The software automatically scans the networks and identifies all devices and their respective network interfaces, specifying their IPv4 and IPv6 addresses as well as the physical addresses throu
Publish At:2015-09-26 20:10 | Read:9122 | Comments:0 | Tags:Hacking Tools Network Hacking evil foca evilfoca ipv6 ipv6 s

It’s official: North America out of new IPv4 addresses

Remember how, a decade ago, we told you that the Internet was running out of IPv4 addresses? Well, it took a while, but that day is here now: Asia, Europe, and Latin America have been parceling out scraps for a year or more, and now the ARIN wait list is here for the US, Canada, and numerous North Atlantic and Caribbean islands. Only organizations in Africa
Publish At:2015-07-04 16:05 | Read:5949 | Comments:0 | Tags:Cyber Security Security Updates Technology Uncategorized add


Tag Cloud