{"id":2564,"date":"2016-09-14T05:59:15","date_gmt":"2016-09-14T05:59:15","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2564"},"modified":"2022-10-19T16:10:55","modified_gmt":"2022-10-19T23:10:55","slug":"ipv6-security-vulnerability-scanning","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/","title":{"rendered":"IPv6 Security Vulnerability Scanning"},"content":{"rendered":"<p>There are many topics that fall under the heading of \u201cHow is the IPv6 protocol that I am less familiar with different than the IPv4 protocol that I know very well\u201d.\u00a0 By now, readers of the\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/bg-p\/IPv6\" target=\"_blank\" rel=\"noopener noreferrer\">Infoblox IPv6 Center of Excellence community blog<\/a>\u00a0should be familiar with several of the major differences between IPv4 and IPv6.\u00a0 Among these differences are the packet header format,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/When-is-an-IPv6-address-an-address-and-when-is-it-a-prefix\/ba-p\/6901\" target=\"_blank\" rel=\"noopener noreferrer\">addressing format<\/a>,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/Staring-at-IPv6-s-Prosthetic-Head-ers-part-1\/ba-p\/3424\" target=\"_blank\" rel=\"noopener noreferrer\">extension headers<\/a>,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/Holding-IPv6-Neighbor-Discovery-to-a-Higher-Standard-of-Security\/ba-p\/3470\" target=\"_blank\" rel=\"noopener noreferrer\">neighbor discovery protocol<\/a>,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/High-Availability-DHCPv6\/ba-p\/3441\" target=\"_blank\" rel=\"noopener noreferrer\">DHCP server redundancy<\/a>, among other protocol characteristics.\u00a0 There are also several important distinctions between how security vulnerability scanning is performed for IPv4 and IPv6 nodes.\u00a0 This article will highlight these variations so you are prepared to evaluate your IPv6 security as your organization moves forward with its IPv6 deployment.<\/p>\n<h2 id=\"toc-hId-649910263\">Security Vulnerability Scanning<\/h2>\n<p>Typical security\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Vulnerability_scanner\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">vulnerability scanners<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.qualys.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Qualys QualysGuard<\/a>,\u00a0<a href=\"https:\/\/www.rapid7.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Rapid7 Nexpose<\/a>,\u00a0<a href=\"http:\/\/www.tenable.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Tenable Nessus<\/a>, among numerous others, send packets to IP addresses on local or remote networks and record what gets returned.\u00a0 They try to send packets to systems in order to discover nodes on the networks and detect if they can establish connections to services listening on specific open TCP or UDP ports.\u00a0 This basic\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Port_scanner\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">port scanning<\/a>\u00a0function is the lowest common denominator among all products.\u00a0 The vulnerability scanners come with pre-loaded and constantly updated known vulnerabilities that are tested and provide reports of known weaknesses in the environment.\u00a0 Other scanners have more advanced functionality, like performing web application scanning and looking for the\u00a0<a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">OWASP top 10 web application risks.<\/a>\u00a0 Vulnerability scanners can perform credentialed scans of computers based on known authorized usernames and passwords to inspect the internal configuration of the target system.\u00a0 Performing continuous vulnerability assessments is number 4 on the\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.sans.org\/media\/critical-security-controls\/critical-controls-poster-2016.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SANS\/CIS 20 Critical Security Controls<\/a>\u00a0(CSCs).<\/p>\n<p>Some methods of performing vulnerability assessments involve putting an agent or software component on the device under test (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Device_under_test\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DUT<\/a>).\u00a0 That agent then reports back to a centralized system about the security settings on that computer.\u00a0 Agents, however, can be problematic. \u00a0Enterprises may struggle with the challenges of loading an agent on all computers in the enterprise.\u00a0 Many computers are not within reach of the IT department and agents require updating and occasional troubleshooting.<\/p>\n<h2 id=\"toc-hId-678539414\">Scanning IPv4 Networks<\/h2>\n<p>Historically, vulnerability scanners only had one IP version running on the network to perform remote testing.\u00a0 On an IPv4 network, the vulnerability scanning appliance or virtual scanning system can scan all the internal IPv4 addresses (e.g., 10.0.0.0\/8, etc.).\u00a0 The vulnerability scanner will then proceed to constantly scan the network, or run scheduled scans that take hours or days to complete.\u00a0 The duration depends on the size of the network, the population density of the IP subnets, and the rigorousness of the scans.<\/p>\n<p>We can perform a rough calculation of how long a scan might take.\u00a0 Let\u2019s suppose that we want to sequentially scan an IPv4 \/8 block with a total of 16,777,216 possible IPv4 addresses.\u00a0 If we started by only scanning for 30 popular TCP port numbers at a rate of 1000 packets-per-second (pps) then it would take 140 hours or about 6 days to complete.\u00a0 However, there are much faster scanners available that are optimized and multi-threaded for improved performance.\u00a0 There are even highly-optimized tools like\u00a0<a href=\"https:\/\/zmap.io\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ZMAP<\/a>\u00a0and\u00a0<a href=\"https:\/\/github.com\/robertdavidgraham\/masscan\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MASSCAN<\/a>\u00a0that have the ability to generate tremendous amounts of scanning traffic.\u00a0 ZMAP and MASSCAN can be used to map out the entire public IPv4 address space in\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/zmap.io\/paper.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">less than an hour<\/a>.<\/p>\n<h2 id=\"toc-hId-707168565\">Scanning IPv6 Networks<\/h2>\n<p>Now, let\u2019s consider how IPv6 changes the scanning practice.\u00a0 The IPv6 address space is so immense that it is nearly impossible to scan each IPv6 address in a given subnet to try to determine if a node is using that address.\u00a0 For example, within a single \/64 prefix, there are 18,446,744,073,709,551,616 (about 18 quintillion) unique interface identifiers (IIDs).\u00a0 As stated in IETF\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc5157\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 5157<\/a>\u00a0\u201cIPv6 Implications for Network Scanning\u201d: \u201cAt a very conservative one probe per second, such a scan may take some 5 billion years to complete.\u201d\u00a0 Hackers may be patient and persistent, but that is too much.\u00a0 \u00a0(The IETF\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc7707\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7707<\/a>\u00a0titled \u201cNetwork Reconnaissance in IPv6 Networks\u201d obsoletes RFC 5157 and describes additional methods of reconnaissance that could be used by a vulnerability scanner.)<\/p>\n<p>We should also mention that there are more intelligent methods of performing reconnaissance on a link-local segment. These methods offer improvements over the brute-force sequential scanning method.\u00a0 They might include, for example, the same techniques used to perform\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.cs.columbia.edu\/~smb\/papers\/v6worms.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Internet worm propagation<\/a>.<\/p>\n<p>Reconnaissance scanning is trivial in the following situations:<\/p>\n<ul>\n<li>When nodes are allocated sequential IIDs addresses such as ::1, ::2, ::3, ::4, \u2026<\/li>\n<li>When nodes have their IPv6 address in DNS zones that can be queried<\/li>\n<li>When nodes respond to an ICMPv6 echo-request sent to the all-nodes link-local multicast (FF02::1)<\/li>\n<li>When nodes respond to an invalid extension header sent to the all-nodes link-local multicast (FF02::1)<\/li>\n<li>When nodes respond to an MLD query send to the all-nodes link-local multicast (FF02::1)<\/li>\n<li>When nodes send an ICMPv6 type 135 Neighbor Solicitation (NS) for a rogue default router sending an ICMPv6 type 134 Router Advertisement (RA)<\/li>\n<li>Using other methods of leveraging IPv4 to learn the IPv6 address of the dual-protocol node<\/li>\n<\/ul>\n<p>Reconnaissance is also easier to perform if all the nodes on the network use SLAAC and\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6_address#Modified_EUI-64\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EUI-64<\/a>\u00a0with the same Ethernet NIC OUI.\u00a0 In this case, the first 24 bits of the IID will all be the same, the next 16 bits of the IID are FFFE, followed by the unique 24 bits of the node\u2019s MAC address.\u00a0 Scanning 2^<sup>24<\/sup>\u00a0IPv6 addresses might take only a few days.\u00a0 Reconnaissance can also be performed if the nodes are using 6to4, ISATAP, or Teredo with known IPv4 addresses.<\/p>\n<p>Utilities like\u00a0<a href=\"https:\/\/github.com\/vanhauser-thc\/thc-ipv6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Hacker\u2019s Choice IPv6 Attack Toolkit<\/a>, the\u00a0<a href=\"https:\/\/www.si6networks.com\/tools\/ipv6toolkit\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SI6 Networks IPv6 Toolkit<\/a>,\u00a0<a href=\"http:\/\/www.secfu.net\/tools-scripts\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Chiron<\/a>,\u00a0<a href=\"https:\/\/github.com\/dragonresearchgroup\/pfuzz\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">pfuzz<\/a>, and\u00a0<a href=\"http:\/\/www.secdev.org\/projects\/scapy\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Scapy<\/a>\u00a0scripts can perform these types of reconnaissance to learn the IPv6 addresses.\u00a0 Once the IPv6 addresses are known, then these can be used to more rigorously scan for vulnerabilities.<\/p>\n<p>The speed of vulnerability scanning is related to the node population density.\u00a0 The population density is measured as the number of active hosts divided by the total number of possible addresses.\u00a0 For example, on an IPv4 network, there could be 100 active hosts on a \/24 subnet with a total of 254 possible addresses for a density of .393.\u00a0 On an IPv6 \/64 network with 100 active hosts the density would be .00000000000000000542. \u00a0This is very near the equivalent of a finding a specific single grain of sand in the Sahara desert!<\/p>\n<p>Not only are the subnets sparsely populated with nodes, but the subnets themselves are most often sparsely assigned.\u00a0 If an organization has been allocated a \/36 as a large enterprise, that allows for 2^<sup>28<\/sup>\u00a0\/64 prefixes (268,435,456).\u00a0 Remote scanning is even more difficult than on-link scanning where you can generate link-local multicast packets.\u00a0 With remote scanning you must have end-to-end IPv6 reachability to the scanning target.\u00a0 This might be difficult to achieve if there is a firewall or IPS in the path. \u00a0Furthermore, most enterprises do not yet have end-to-end IPv6 reachability for their corporate LAN clients and data center servers.<\/p>\n<h2 id=\"toc-hId-735797716\">IPv6-Capable Vulnerability Scanners<\/h2>\n<p>Because of the immensity of the IPv6 address space, most scanning utilities do not even permit the user to attempt to perform a scan on an entire \/64, much less an entire \/40 prefix that might have been allocated to an enterprise by an RIR.\u00a0 Furthermore, tools like ZMAP and MASSCAN do not even support IPv6.<\/p>\n<p>The first question to ask is, \u201cdo any of my existing vulnerability scanners support IPv6?\u201d\u00a0 More precisely, do they have\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/Mind-the-Gap-Feature-versus-Functional-Parity-in-IPv6\/ba-p\/3882\" target=\"_blank\" rel=\"noopener noreferrer\">feature and functional parity<\/a>\u00a0between IPv4 and IPv6? In other words, for the tasks they perform in IPv4, are they able to perform those same tasks for IPv6?\u00a0 As mentioned earlier, there are different types of security scanners.\u00a0 They range from the most basic port scanners to the most advanced web application and database scanners.\u00a0 If they only perform basic scanning of open ports for IPv6, but do much more in-depth application scanning for IPv4, then you lack the functionality (i.e., functional parity) you really need.\u00a0 This is why it is important to ask your vendors about IPv4 and IPv6 functional parity of their products.\u00a0 Surely any modern product that has just been developed and released should have\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-Center-of-Excellence\/Making-a-New-Product-Make-it-Dual-Protocol\/ba-p\/3421\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6 capabilities right from the start<\/a>.<\/p>\n<p>One of the major considerations of IPv4 vulnerability scanners is cost, given that they have historically been licensed based on the number of IPv4 addresses that you can scan.\u00a0 If you purchased a license for 256 IP addresses, then you are limited to scanning a \/24 IPv4 subnet or a specific list of 256 hosts.\u00a0 However, with IPv6, the subnet ranges are so much larger (albeit extremely sparsely populated) that this software licensing model breaks down.<\/p>\n<p>The good news is that most port scanners and vulnerability scanners already support IPv6.\u00a0 Security vulnerability scanning products like those mentioned earlier (<a href=\"https:\/\/qualysguard.qualys.com\/qwebhelp\/fo_portal\/scans\/scan_ipv6_hosts.htm\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Qualys<\/a>,\u00a0<a href=\"https:\/\/www.rapid7.com\/company\/news\/press-releases\/2012\/ipv6-discovery.jsp\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Rapid7<\/a>, and\u00a0<a href=\"https:\/\/www.tenable.com\/blog\/ipv6-scanning-with-nessus-and-pvs\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Tenable<\/a>) all support IPv6.\u00a0 However, they need to be provided a list of individual IPv6 addresses to scan.\u00a0 A proper vulnerability scanner shouldn\u2019t make you enter each one manually.\u00a0 In fact, most vulnerability scanners let you add in a list of IPv6 addresses, either as a big list\/text file, or a CSV file.\u00a0 Therefore, we must first obtain a list of the individual IPv6 addresses to be scanned.<\/p>\n<h2 id=\"toc-hId-764426867\">Determining the IPv6 Addresses<\/h2>\n<p>When you have an IPv6-capable vulnerability scanner that can scan individual IPv6 addresses, the next step is to assemble the list of all active IPv6 nodes in the environment.<\/p>\n<p>One method of creating this list might be to scrape all the routers for their MAC address tables (ARP table, neighbor cache) to find all the connected devices.\u00a0 One way to gather this information is from the routers themselves using the CLI.\u00a0 You can use commands such as \u201cshow ipv6 neighbors\u201d or \u201cshow ipv6 neighbor binding\u201d on a Cisco device to learn the active connected nodes.\u00a0 This could be automated with a simple\u00a0<a href=\"http:\/\/packetpushers.net\/podcast\/podcasts\/show-270-design-build-9-automation-python-netmiko\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Python script<\/a>.\u00a0 Another option may be to use SNMP to query MIB values of the routers to gather their neighbor cache entries.\u00a0 The trick here is finding the correct MIB OID value to query (or just performing an SNMP walk of the device).<\/p>\n<p>Another way to discover active IPv6 addresses is to perform a bulk lease query of the DHCPv6 server to gather a list of the active IPv6 address leases.\u00a0 With an Infoblox appliance, you can view the DHCP lease history data.\u00a0 The\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/dloads.infoblox.com\/direct\/appliance\/NIOS\/NIOS_AdminGuide_6.3.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NIOS Administrator Guide<\/a>\u00a0shows you how you can use the web interface of the Grid Manager by selecting the \u201cData Management\u201d tab, then selecting the \u201cDHCP\u201d tab, then clicking on the \u201cLeases\u201d tab and then \u201cLease History\u201d.\u00a0 You can also export the lease records by clicking on the \u201cExport\u201d icon and proceeding to download the CSV file.\u00a0 This can then be used with your favorite vulnerability scanner to input the list of IPv6 addresses to scan.<\/p>\n<p>You could also use\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/network-insight\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox Network Insight<\/a>\u00a0to\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Community-Blog\/Enhanced-IPAM-with-Network-Insight\/ba-p\/3378\" target=\"_blank\" rel=\"noopener noreferrer\">discover what is connected<\/a>\u00a0to your network. Network Insight can automatically share address information with\u00a0<a href=\"https:\/\/www.infoblox.com\/resources\/videos\/infoblox-ipam\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Infoblox IPAM<\/a>\u00a0system.\u00a0 The\u00a0<a href=\"https:\/\/www.infoblox.com\/partners\/technology-partners\/cisco-ise\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Insight Manager integrates<\/a>\u00a0with Cisco\u2019s\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/products\/security\/identity-services-engine\/index.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Identity Services Engine<\/a>\u00a0(ISE), sharing data related to endpoints and connectivity with Cisco\u2019s\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/products\/security\/pxgrid.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Platform Exchange Grid<\/a>\u00a0(pxGrid).\u00a0 Cisco\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/security\/ise\/2-0\/release_notes\/ise20_rn.html#pgfId-592126\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ISE 2.0 now supports IPv6<\/a>.\u00a0 Network Insight also integrates with popular vulnerability scanners to speed up the sharing of data between platforms.\u00a0 There are even\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Community-Blog\/Getting-Started-with-the-Infoblox-Web-API\/ba-p\/3161\" target=\"_blank\" rel=\"noopener noreferrer\">RESTful APIs<\/a>\u00a0that can be used with Python scripts to automate operation of Network Insight.<\/p>\n<h2 id=\"toc-hId-793056018\">Correlating the Two Address Families<\/h2>\n<p>One of the challenges with\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/2222870\/cisco-subnet\/dual-stack-will-increase-operating-expenses.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">operating a dual-protocol network<\/a>\u00a0that we do not yet have a good solution for today is how to equate IPv4 and IPv6 security information for a given host.\u00a0 If your organization uses a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Security Information Event Management<\/a>\u00a0(SIEM) system in a dual-protocol environment, then you need it to be cognizant about which hosts have both IPv4 and IPv6 addresses.\u00a0 There are significant challenges around correlating findings for systems that used both IPv4 and IPv6.\u00a0\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/2224154\/cisco-subnet\/using-dual-protocol-for-siems-evasion.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Using multiple address families<\/a>\u00a0to conduct an attack could be a sophisticated strategy used by attackers to evade detection.\u00a0 Imagine a piece of malware that infects one host over an IPv4 web vulnerability, but then uses IPv6 to spread to other nodes on the local LAN, and those newly infected nodes use either IPv4 or IPv6 to communicate to a botnet command and control network.\u00a0 Correlating those attack trajectories is daunting.<\/p>\n<p>This same concept also applies to security vulnerability scanning.\u00a0 How does the scanner know that the node with the IPv4 address of 10.45.73.56 is the same node with the IPv6 address 2001:db8:476:34:8d94:d36b:7bfd:7e27?\u00a0 A scanner may not be able to correlate information across address families.\u00a0 However, agent-based approaches may be aware that the node has both an IPv4 and an IPv6 address.<\/p>\n<p>What we need is an IP address management (IPAM) system that can correlate MAC addresses and DHCP Unique Identifiers (DUIDs) with DHCP\/DHCPv6 lease information, while at the same time inspecting the network Ethernet switch ports and sharing this data with a SIEM.\u00a0 We need security systems that are integrated and collaboratively share information to help create the most effective enterprise security platform.<\/p>\n<h2 id=\"toc-hId-821685169\">Summary<\/h2>\n<p>As your organization begins to deploy IPv6 you will need to test the IPv6 attack surface, just as you check for IPv4 security vulnerabilities.\u00a0 You will likely start your IPv6 deployment at the perimeter so it is those Internet-facing systems that will be first exposed.\u00a0 As a result, you will need to scan these systems first.\u00a0 You will need a vulnerability scanner that is also capable of testing for web application vulnerabilities with the most current known vulnerability information.<\/p>\n<p>Initially, your\u00a0<a href=\"http:\/\/www.networkworld.com\/article\/2221687\/cisco-subnet\/internet-edge-ipv6-deployment.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Internet-edge IPv6 deployment<\/a>\u00a0will use static IPv6 addresses, so knowing which nodes and the corresponding IP addresses that need scanning will be easy.\u00a0 However, as you start to bring IPv6 inward to your organization, that list of IPv6 addresses will grow.\u00a0 You will need to anticipate this transition to dual-stack systems and have a strategy for how to gather up-to-date lists of IPv6 addresses and proactively perform vulnerability scanning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many topics that fall under the heading of \u201cHow is the IPv6 protocol that I am less familiar with different than the IPv4 protocol that I know very well\u201d.\u00a0 By now, readers of the\u00a0Infoblox IPv6 Center of Excellence community blog\u00a0should be familiar with several of the major differences between IPv4 and IPv6.\u00a0 Among [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":2565,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,56,38,32,101,15,48],"class_list":{"0":"post-2564","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv4","10":"tag-ipv6","11":"tag-malware","12":"tag-network-insight","13":"tag-security","14":"tag-threat","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IPv6 Security Vulnerability Scanning<\/title>\n<meta name=\"description\" content=\"IPv6 can be utilized to scan malware related threats on your network. Find out if you are at risk and what you can do to better protect you network here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 Security Vulnerability Scanning\" \/>\n<meta property=\"og:description\" content=\"IPv6 can be utilized to scan malware related threats on your network. Find out if you are at risk and what you can do to better protect you network here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-14T05:59:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:10:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"IPv6 Security Vulnerability Scanning\",\"datePublished\":\"2016-09-14T05:59:15+00:00\",\"dateModified\":\"2022-10-19T23:10:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/\"},\"wordCount\":2302,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"keywords\":[\"Infoblox\",\"IPv4\",\"IPv6\",\"Malware\",\"Network Insight\",\"Security\",\"Threat\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/\",\"name\":\"IPv6 Security Vulnerability Scanning\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"datePublished\":\"2016-09-14T05:59:15+00:00\",\"dateModified\":\"2022-10-19T23:10:55+00:00\",\"description\":\"IPv6 can be utilized to scan malware related threats on your network. Find out if you are at risk and what you can do to better protect you network here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 Security Vulnerability Scanning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-security-vulnerability-scanning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 Security Vulnerability Scanning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IPv6 Security Vulnerability Scanning","description":"IPv6 can be utilized to scan malware related threats on your network. Find out if you are at risk and what you can do to better protect you network here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 Security Vulnerability Scanning","og_description":"IPv6 can be utilized to scan malware related threats on your network. Find out if you are at risk and what you can do to better protect you network here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/","og_site_name":"Infoblox Blog","article_published_time":"2016-09-14T05:59:15+00:00","article_modified_time":"2022-10-19T23:10:55+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"IPv6 Security Vulnerability Scanning","datePublished":"2016-09-14T05:59:15+00:00","dateModified":"2022-10-19T23:10:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/"},"wordCount":2302,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","keywords":["Infoblox","IPv4","IPv6","Malware","Network Insight","Security","Threat"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/","name":"IPv6 Security Vulnerability Scanning","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","datePublished":"2016-09-14T05:59:15+00:00","dateModified":"2022-10-19T23:10:55+00:00","description":"IPv6 can be utilized to scan malware related threats on your network. Find out if you are at risk and what you can do to better protect you network here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","width":660,"height":454,"caption":"IPv6 Security Vulnerability Scanning"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-security-vulnerability-scanning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"IPv6 Security Vulnerability Scanning"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2564"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2564\/revisions"}],"predecessor-version":[{"id":8104,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2564\/revisions\/8104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}