| Line 2: |
Line 2: |
| | | | |
| | IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited. | | IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited. |
| − |
| |
| | | | |
| | It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols. | | It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols. |
| Line 13: |
Line 12: |
| | * [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port | | * [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port |
| | * [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget | | * [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget |
| − | * [[IPv6_DEBUG]] - some steps for debugging IPv6 access to my IPv6 Port Scanner | + | * [[IPv6_DEBUG]] - some steps for debugging IPv6 access to the IPscan IPv6 Port Scanner |
| | * [[IPv6_Windows7]] - some useful Win7 IPv6-related commands | | * [[IPv6_Windows7]] - some useful Win7 IPv6-related commands |
| − | * [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester. | + | * [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester. |
| − | | |
| | | | |
| | ===NTP Monitor List Query '''UDP/123[1]'''=== | | ===NTP Monitor List Query '''UDP/123[1]'''=== |
| Line 44: |
Line 42: |
| | </TABLE> | | </TABLE> |
| | | | |
| − | This website publishes a Privacy Policy. Continued use of this website implies your consent to the storage of data outlined in the policy. | + | This website publishes a Privacy Policy. Continued use of this website implies your consent to the use of data outlined in the policy. |
| | ---- | | ---- |