It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols.
It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols.
+
+
+
Links to other areas of the wiki:
+
+
[[IPv6 IPv6 Firewall tester]] - an overview of IPscan (IPv6 Port Scanner)
+
[[IPv6_Firewalls IPv6 Firewalls]] - some observations on IPv6 firewalls and address selections
+
[[IPv6_Ports IPscan default ports]] - a list of the default TCP/IP and UDP/IP ports which IPscan will test
+
[[ScanStatus IPscan reporting]] - a description of the reportable states for each tested TCP/IP or UDP/IP port
+
[[ScanAutomation IPscan test automation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget
+
[[IPv6_DEBUG IPscan Debug]] - some steps for debugging IPv6 access to my IPv6 Port Scanner
+
[[IPv6_Windows7 Windows 7 IPv6]] - some useful Win7 IPv6-related commands
+
[[Raspberry_Pi_IPv6_firewall_tester RasPi IPv6 Firewall tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester.