Category: Nmap

Nmap IPv6 addresses

When conducting a penetration test against an IPv6 enabled system, the first step is to determine what services are accessible over IPv6. Then you should close unnecessary ports for third persons ; for example SSH.

Consider the Nmap results below

Easy portscan syntax:

root@zee:~# nmap -6 2001:470:1f0b:1604::3
A little bit complexer syntax without DNS resolution, and a predefined port range:
Output:

root@zee:~# nmap -6 -p1-10000 -n 2001:470:1f0b:1604::3 -PN
Output: Read More