{"id":9218,"date":"2023-12-12T14:09:07","date_gmt":"2023-12-12T22:09:07","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9218"},"modified":"2023-12-13T10:21:11","modified_gmt":"2023-12-13T18:21:11","slug":"large-scale-ipv6-internet-reconnaissance-part-1-of-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/","title":{"rendered":"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2)"},"content":{"rendered":"<p>As IPv6\u2019s popularity has grown and its usage on the Internet has increased, it has caught the attention of attackers.\u00a0 Typically, targeted attacks begin with reconnaissance to first identify the victim.\u00a0 Then active network scanning and exploring leads to exploitation of the target.\u00a0 This is followed by the attacker maintaining access, covering their tracks, and leveraging that access to pivot to additional targets.\u00a0 With the finite limits of IPv4 addresses and their high density and utilization, reconnaissance of all public IPv4 addresses is commonplace.\u00a0 However, IPv6, in theory, may change how Internet reconnaissance is performed.<\/p>\n<h3>IPv6: Too Big to Scan?<\/h3>\n<p>Previously, it was believed that the vastness of IPv6\u2019s address space made scanning too difficult, if not impossible.\u00a0 For a remote attacker, it may be too difficult to even find the \/64s assigned to individual access networks.\u00a0 For example, if an enterprise organization is allocated a \/32 from a<a href=\"https:\/\/en.wikipedia.org\/wiki\/Regional_Internet_registry\"> Regional Internet Registry<\/a> (RIR), they could theoretically have 2^32 \/64 prefixes, equal to 4,294,967,296 possible \/64 prefixes (~4.3B prefixes).<\/p>\n<p>Remotely finding the network \/64 prefix is one thing but finding all the individual end-nodes\u2019 complete 128-bit global unicast IPv6 addresses is another.\u00a0 It was also previously believed that even link-local IPv6 reconnaissance was nearly impossible.\u00a0 Local reconnaissance is when the attacker has direct access to the link or has compromised a system that is on the local LAN and the attacker attempts to find other nodes on the same segment.<\/p>\n<p>If the attacker were to perform a brute-force scan of all possible link-local IPv6 nodes, it could take an astronomically long time.\u00a0 A single IPv6 \/64 prefix has 2^64 possible theoretical addresses.\u00a0 Trying to scan 18,446,744,073,709,551,616 addresses at a rate of 1,000,000 probes\/second would take 18,446,744,073,709 seconds, which equals 584,942 years.\u00a0 Attackers can be patient, but that would be ridiculous.<\/p>\n<p>Remote and link-local brute-force IPv6 reconnaissance has been rightfully considered too time-consuming.\u00a0 But creative security researchers and attackers have discovered methods to intelligently perform \u201cinformed scanning\u201d to reduce the time it takes.<\/p>\n<h3>Trivial Reconnaissance<\/h3>\n<p>IPv6 reconnaissance can be trivial if the target uses an IPv6 address with an Interface Identifier (IID) where the last least-significant 64-bits are low and sequential (e.g., ::, ::1, ::2, ::3, ::4, etc.).\u00a0 If a target network simply uses the last octet of their node\u2019s IPv4 address and uses those 3 digits to form the last 3 hexadecimal digits of the IPv6 IID (e.g., 192.168.10.123\/24, 2001:db8:10:10::123\/64), then the attacker would only need to scan 254 IPv6 addresses.<\/p>\n<p>Finding network segments would also be trivial if the network (i.e., the high-order 64-bits) prefix used sequential IPv6 prefix assignments.\u00a0 For example, if an organization has been allocated 2001:db8:1100::\/40 and the first subnet is assigned 2001:db8:1100:1::\/64, the second subnet is assigned 2001:db8:1100:2::\/64, and the third uses 2001:db8:1100:3::\/64, then reconnaissance is easy.<\/p>\n<p>Link-local reconnaissance is also trivial.\u00a0 If the attacker is on-link, they could easily learn the \/64 prefix by observing a Router Advertisement (RA) or observing any traffic traversing the LAN.\u00a0 The attacker would also assume that all IPv6-enabled nodes on the network have an fe80::\/10 link-local address.\u00a0 The attacker could easily find nodes that respond to ICMPv6 messages sent to the ff02::1 link-local all-nodes multicast group (e.g., Linux hosts). Or the attacker could simply send a rogue RA and glean information about the nodes that activated their IPv6 stacks (although<a href=\"https:\/\/blogs.infoblox.com\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/\"> IPv6 First-Hop-Security<\/a> (FHS) measures can mitigate that last threat).<\/p>\n<p>Organizations may want nodes to have static (<a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8064\">or stable<\/a>) IPv6 addresses for simpler proactive management or security functions like reputation systems.\u00a0 The hope is that having sparse prefixes and randomized IIDs helps preserve privacy and avoids active probing reconnaissance by adversaries.\u00a0 However, as outlined below, these could still be discovered.<\/p>\n<h3>Creative Reconnaissance<\/h3>\n<p>Creativity is one characteristic that separates us humans from our AI-fueled robot overlords.\u00a0 For more than a decade now, security researchers have been inventing a variety of alternative methods to find IPv6 targets. <a href=\"https:\/\/www.gont.com.ar\/\">\u00a0Fernando Gont<\/a> and<a href=\"https:\/\/beta.jisc.ac.uk\/staff\/tim-chown\"> Tim Chown<\/a> authored an IETF RFC,<a href=\"https:\/\/tools.ietf.org\/html\/rfc7707\"> Network Reconnaissance in IPv6 Networks<\/a> (RFC 7707), that discusses the concepts surrounding how attackers could find IPv6 targets.\u00a0 This RFC discusses how an attacker could be on the local access network scanning for nodes or how the attacker could be more than one layer-3 hop away or across the Internet performing remote reconnaissance.\u00a0 Of course, attackers could find IPv6 addresses in other places, like DNS, logs, DHCPv6 server databases, Google hacking, online forums, packet capture snooping, and observing flow data.\u00a0 One could also use SNMP to query routers for their IPv6 neighbor caches or look in other IPv6 nodes\u2019 neighbor caches to find target addresses.<\/p>\n<p>Attackers, by their very nature, will be creative in their approaches.\u00a0 When performing network reconnaissance, it is important to remember that anything that elicits a response reveals that something is there.\u00a0 The attacker doesn\u2019t need to generate a legitimate packet so long as the victim sends back an error message in return. The attacker observes the source address in the returned packet and now has a valuable piece of information to continue the attack process.<\/p>\n<p>Prior to RFC 7707\u2019s publication in 2016, some other innovative approaches to remote reconnaissance network scanning emerged.\u00a0 One technique is akin to depth-finding on a boat. This method explores the IPv6 Internet one hop at a time by sending packets that increase IPv6 header Hop Limit values.\u00a0 This is like the method traceroute uses to find addresses along a path and evaluating the types of addresses that return<a href=\"https:\/\/www.iana.org\/assignments\/icmpv6-parameters\/icmpv6-parameters.xhtml#icmpv6-parameters-codes-4\"> ICMPv6 Type 3 Time Exceeded<\/a> (Code 0 hop limit exceeded in transit) messages. <a href=\"https:\/\/paris-traceroute.net\/\">\u00a0Paris Traceroute<\/a> methods (like those implemented in<a href=\"https:\/\/www.caida.org\/catalog\/software\/scamper\/\"> Scamper<\/a>) can also find multiple alternate paths to a destination and identify more IPv6 addresses along the way.<\/p>\n<p>Another creative approach to finding IPv6 networks on the Internet is what is called the \u201cToo Big Trick (TBT)\u201d.\u00a0 This technique involves sending a 1300-byte<a href=\"https:\/\/www.iana.org\/assignments\/icmpv6-parameters\/icmpv6-parameters.xhtml#icmpv6-parameters-codes-6\"> ICMP6 Type 128 Echo Request<\/a> to some network on the Internet.\u00a0 When the router sends back the<a href=\"https:\/\/www.iana.org\/assignments\/icmpv6-parameters\/icmpv6-parameters.xhtml#icmpv6-parameters-codes-7\"> ICMPv6 Type 129 Echo Reply<\/a>, it is ignored and the attacker sends an<a href=\"https:\/\/www.iana.org\/assignments\/icmpv6-parameters\/icmpv6-parameters.xhtml#icmpv6-parameters-codes-3\"> ICMP6 Type 2 Packet Too Big<\/a> message with a MTU lower than 1300 bytes.\u00a0 The attacker then sends a new ICMPv6 Echo Request and observes that the router sends back a fragmented ICMPv6 Echo Reply.\u00a0 The attacker can then probe beyond that router and observe the fragmentation identifiers of the subsequent ICMPv6 Echo Requests.\u00a0 Billy Brinkmeyer, Robert Beverly, and Justin Rohrer from the Naval Postgraduate School (NPS), along with Matthew Luckie from CAIDA at the University of California San Diego, wrote about this technique in their 2013 paper titled \u201c<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-36516-4_16\">IPv6 Alias Resolution via Induced Fragmentation<\/a>\u201d (<a href=\"https:\/\/www.caida.org\/workshops\/isma\/1302\/slides\/aims1302_wbrinkmeyer.pdf\">and presentation<\/a>).\u00a0 This technique of mapping out networks with ICMPv6 Type 2 Packet Too Big (PTB) Messages can be used for remote reconnaissance and these techniques are implemented in the tools<a href=\"https:\/\/www.cmand.org\/tbt\/\"> tbt.py<\/a> and<a href=\"https:\/\/www.caida.org\/catalog\/software\/scamper\/\"> Scamper<\/a>.\u00a0 This PTB technique and its implications on load balancers and anycast services was also documented in IETF RFC 7690, \u201c<a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc7690\">Close Encounters of the ICMP Type 2 Kind (Near Misses with ICMPv6 Packet Too Big (PTB))<\/a>\u201d.<\/p>\n<h3>Leveraging DNS to Find IPv6 Targets<\/h3>\n<p>Next, we can assume that any entries put into Internet-accessible DNS resource records are intended to be found and that attackers could find this information as well.\u00a0 Attackers can find domain names easily enough if they know their intended target domain name; or if they can learn it from the<a href=\"http:\/\/s3-us-west-1.amazonaws.com\/umbrella-static\/index.html\"> Cisco Umbrella 1 Million<\/a> (top 1M most popular domains), the<a href=\"https:\/\/majestic.com\/reports\/majestic-million\"> Majestic Million<\/a> (the million domains with the most referring subnets) (<a href=\"https:\/\/downloads.majestic.com\/majestic_million.csv\">.CSV file<\/a>), or the ICANN<a href=\"https:\/\/czds.icann.org\/home\"> Centralized Zone Data Service<\/a> (CZDS) (&gt; 300M domains).<\/p>\n<p>Attackers can perform a DNS query for a FQDN with an IPv4 A record and an IPv6 AAAA record.\u00a0 This might indicate that the target host has both IPv4 and IPv6 but that isn\u2019t necessarily the case.\u00a0 The attacker could then run a traceroute to both addresses to reveal if the network topology is congruent.\u00a0 The attacker could also perform host OS fingerprinting or TCP timestamp time drift analysis to determine if the IPv4 and IPv6 address are on the same target host.\u00a0 These techniques were written about in \u201c<a href=\"https:\/\/www.cmand.org\/papers\/siblings-pam15.pdf\">Server Siblings: Identifying Shared IPv4\/IPv6 Infrastructure via Active Fingerprinting<\/a>\u201d by Robert Beverly and Arthur Berger.<\/p>\n<p>Another technique is where the attacker performs reverse DNS enumeration by doing DNS queries for PTR records for IPv6 addresses.\u00a0 IPv6 reverse DNS \u201cPTR\u201d records are in reverse zone files using the name of the IPv6 prefix. For example, 2001:db8:80::\/48 file would be named 0.8.0.0.8.b.d.0.1.0.0.2.ip6.arpa.\u00a0 Peter van Dijk wrote about this on March 26, 2012 in \u201c<a href=\"https:\/\/7bits.nl\/blog\/posts\/finding-v6-hosts-by-efficiently-mapping-ip6-arpa\">Finding v6 hosts by efficiently mapping ip6.arpa<\/a>\u201d and on April 8, 2012 in \u201c<a href=\"https:\/\/7bits.nl\/blog\/posts\/ip6-arpa-prior-art-and-results\">ip6.arpa, prior art and results<\/a>\u201d.\u00a0 When the attacker queries the authoritative DNS server for the IPv6 prefix and the DNS server returns a NXDOMAIN error, that indicates the prefix doesn\u2019t exist in the DNS and that there can be no other longer prefix.\u00a0 However, if the DNS server returns a NOERROR error, then there might be a longer prefix that could be queried.\u00a0 Attackers can work diligently to map out different lengths of queries to try to determine which IPv6 prefixes are populated in reverse DNS zone files.<\/p>\n<h3>Part 2<\/h3>\n<p><a href=\"https:\/\/blogs.infoblox.com\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/\">The second part of this article<\/a> will discuss how attackers and security researchers can create lists of reachable IPv6 addresses or try to predict which IPv6 addresses are likely to exist.\u00a0 Then it will cover the tools that can be used for IPv6 Internet scanning and recently detected scanning activities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As IPv6\u2019s popularity has grown and its usage on the Internet has increased, it has caught the attention of attackers.\u00a0 Typically, targeted attacks begin with reconnaissance to first identify the victim.\u00a0 Then active network scanning and exploring leads to exploitation of the target.\u00a0 This is followed by the attacker maintaining access, covering their tracks, and [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":8312,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[112,38,956,957,107],"class_list":{"0":"post-9218","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-vnios","9":"tag-ipv6","10":"tag-reconnaissance","11":"tag-scanning","12":"tag-internet","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox<\/title>\n<meta name=\"description\" content=\"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-12T22:09:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-13T18:21:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2)\",\"datePublished\":\"2023-12-12T22:09:07+00:00\",\"dateModified\":\"2023-12-13T18:21:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/\"},\"wordCount\":1546,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-01.jpg\",\"keywords\":[\"vNIOS\",\"IPv6\",\"reconnaissance\",\"scanning\",\"Internet\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/\",\"name\":\"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-01.jpg\",\"datePublished\":\"2023-12-12T22:09:07+00:00\",\"dateModified\":\"2023-12-13T18:21:11+00:00\",\"description\":\"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-01.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox","description":"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/","og_locale":"en_US","og_type":"article","og_title":"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox","og_description":"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/","og_site_name":"Infoblox Blog","article_published_time":"2023-12-12T22:09:07+00:00","article_modified_time":"2023-12-13T18:21:11+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_title":"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox","twitter_description":"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2)","datePublished":"2023-12-12T22:09:07+00:00","dateModified":"2023-12-13T18:21:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/"},"wordCount":1546,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg","keywords":["vNIOS","IPv6","reconnaissance","scanning","Internet"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/","name":"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2) | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg","datePublished":"2023-12-12T22:09:07+00:00","dateModified":"2023-12-13T18:21:11+00:00","description":"Explore the challenges and possibilities of large-scale IPv6 Internet reconnaissance in Part 1 of this insightful series. Discover the evolving landscape of IPv6 scanning, creative reconnaissance methods, and the tools utilized by attackers and security researchers. Gain valuable insights to better understand the implications and potential vulnerabilities in the IPv6 space.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-01.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Large-Scale IPv6 Internet Reconnaissance (Part 1 of 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9218"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9218\/revisions"}],"predecessor-version":[{"id":9241,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9218\/revisions\/9241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8312"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}