Honeypots mailing list archives

FW: IPv6


From: "Hornat, Charles" <Charles_Hornat () standardandpoors com>
Date: Wed, 18 Dec 2002 13:42:31 -0500


Hey Mike, Its been a while, how have you been?

My question is base don this thought:  In order for the attacker to
compromise the system, they would have used IP 4 and would have been
caught by any existing IDS.  Additionally, once they go through the
trouble of getting IP6 to run on the compromised system, what would they
do with it?  Attack other IP6 systems?  Perhaps there is an exploit in
IP6 that you missed? 

Seems like it adds complication and more possibility
for problems and detection for the attacker to implement.  

Charles
 
 
 
--------------------------------------------------------
The information contained in this message is intended only for the recipient, and may be a confidential attorney-client 
communication or may otherwise be privileged and confidential and protected from disclosure. If the reader of this 
message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended 
recipient, please be aware that any dissemination or copying of this communication is strictly prohibited. If you have 
received this communication in error, please immediately notify us by replying to the message and deleting it from your 
computer.
 
Thank you,
 
Standard & Poor's
 
--------------------------------------------------------

 
 
 


Current thread: