Honeypots mailing list archives
FW: IPv6
From: "Hornat, Charles" <Charles_Hornat () standardandpoors com>
Date: Wed, 18 Dec 2002 13:42:31 -0500
Hey Mike, Its been a while, how have you been? My question is base don this thought: In order for the attacker to compromise the system, they would have used IP 4 and would have been caught by any existing IDS. Additionally, once they go through the trouble of getting IP6 to run on the compromised system, what would they do with it? Attack other IP6 systems? Perhaps there is an exploit in IP6 that you missed? Seems like it adds complication and more possibility for problems and detection for the attacker to implement. Charles -------------------------------------------------------- The information contained in this message is intended only for the recipient, and may be a confidential attorney-client communication or may otherwise be privileged and confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, please be aware that any dissemination or copying of this communication is strictly prohibited. If you have received this communication in error, please immediately notify us by replying to the message and deleting it from your computer. Thank you, Standard & Poor's --------------------------------------------------------
Current thread:
- IPv6 Lance Spitzner (Dec 17)
- <Possible follow-ups>
- RE: IPv6 Hornat, Charles (Dec 18)
- RE: IPv6 mike (Dec 18)
- FW: IPv6 Hornat, Charles (Dec 18)
- Re: FW: IPv6 xbud (Dec 19)
- Re: FW: IPv6 mike (Dec 19)
- Re: IPv6 Jon Miller (Dec 19)
- Re: IPv6 mb_lima (Dec 20)
- Re: IPv6 Valdis . Kletnieks (Dec 20)
- Re: IPv6 mb_lima (Dec 20)
- Re: IPv6 mb_lima (Dec 20)
- Re: IPv6 mb_lima (Dec 20)