Line 2: |
Line 2: |
| | | |
| IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited. | | IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited. |
− |
| |
| | | |
| It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols. | | It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols. |
Line 13: |
Line 12: |
| * [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port | | * [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port |
| * [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget | | * [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget |
− | * [[IPv6_DEBUG]] - some steps for debugging IPv6 access to my IPv6 Port Scanner | + | * [[IPv6_DEBUG]] - some steps for debugging IPv6 access to the IPscan IPv6 Port Scanner |
| * [[IPv6_Windows7]] - some useful Win7 IPv6-related commands | | * [[IPv6_Windows7]] - some useful Win7 IPv6-related commands |
− | * [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester. | + | * [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester. |
− | | |
| | | |
| ===NTP Monitor List Query '''UDP/123[1]'''=== | | ===NTP Monitor List Query '''UDP/123[1]'''=== |
Line 44: |
Line 42: |
| </TABLE> | | </TABLE> |
| | | |
− | This website publishes a Privacy Policy. Continued use of this website implies your consent to the storage of data outlined in the policy. | + | This website publishes a Privacy Policy. Continued use of this website implies your consent to the use of data outlined in the policy. |
| ---- | | ---- |