Students
Teachers
Graduates
Faculties
IPv6 was introduced not only due to the persistent needto provide a large number of addresses, but also with new features to be future oriented protocol that is why it is also known as Next Generation Internet protocol.
One of the most impressive features of this protocol, is the capability of autoconfiguration, either by DHCPv6 (The Dynamic Host Configuration Protocol version 6), or using SLAAC (Stateless Address Autoconfiguration). However, it causes new security vulnerabilities, which allow the attackers to exploit the ICMPv6 (Internet Control Messages Protocol version 6) and execute various attacks on the devices connected to the network.
In this article, we will analyze the attacks related to the fake packets of DAD (Duplicate Address Detection), fake router, and using the multicast address as a destination address for the Echo Request messages in ICMPv6, we will design a test lab contains different operation systems by virtual box, to execute the potential attacks via scapy, analyze the packets by wireshark, and then study the results on the target device.
Research Journal of Aleppo University.
2017.
Students
Teachers
Graduates
Faculties