NMAP

Course
Time
6 hours 31 minutes
Difficulty
Beginner
CEU/CPE
7

Video Transcription

00:00
Welcome to the end map lesson on any map and i p v six.
00:05
In your own map scanning, you may encounter local or remote targets that are on Lee configured using I P. V. Six. Unless you're scanning station is set up properly. You won't be able to run and map skins against them.
00:17
This lesson is focused on the most important points about running and map scans against IBV six targets.
00:23
Let's get started.
00:25
Here are the learning objectives for this lesson.
00:27
First, we'll go over some General I P v six information with regards to end map.
00:32
Next, we'll talk about en masse requirements for the use of I P v six. And finally we'll go over the command line options you need to know in order to run in Mount Scans against I. P v six targets
00:45
since 2002 and map has supported I. P v six
00:49
I. P v six hasn't exactly taking the world by storm. Like most people, including me, thought it might, especially in the US
00:57
I think this is thanks in part to private addressing and network address translation.
01:03
And although Aaron has exhausted all of its I P V four addresses. I haven't seen a lot of instances where I S P s, data centers or cloud service providers haven't been able to provide ample amount of i p feet before addresses when justification has been provided.
01:19
Nevertheless, as network administrators and information security professionals, we must know how to deal with I v. V six, whether on a local network or over the Internet.
01:30
Most of n map scanning features work just fine. Using IBV six addresses,
01:36
for example, he's be only ping scanning, connects, scanning and service in application version detection.
01:42
One of the biggest pieces of advice I can provide to you is that you run and map scans against IBV six targets using their host name instead of their I P V six address.
01:53
The reason for this is pretty clear. I p v six addresses there a lot longer and more complicated to type. I'll go over the syntax later,
02:00
when you run your IBV six scans, you'll see that the output looks exactly the same.
02:06
The only difference is that you'll see an I P. V six address at the top of your scan results.
02:10
This is nice because once you get used to looking at scan results and then map.
02:15
The difference between before and V six scans is negligible. I've included a clip here from an I V I P v six scan with the address highlighted.
02:24
Here are some requirements for running scans against I P V six targets.
02:29
First, both your scanning station and your target must be configured for I P v six.
02:35
When you're scanning, scanning a local network, this usually isn't a problem. You can skin either link local or site local addresses without any problem at all.
02:44
However, if you're scanning a remote host, you might run into more issues. Even if you have an I. P V six configured on your scanning station and the remote target also has it configured, your skin may fail.
02:57
The reason for this is that your eyes P hasn't provided you with an I. P V six address or your router or firewall is not configured with one.
03:05
In other words, you're in maps. Scanning station must be able to successfully route to your target using IBV six.
03:12
If your eyes be hasn't provided you with an I P V six address, you can use a tunnel broker service.
03:17
There are plenty of really good and free service is out there that will allow you to set up an account and allow you to configure your computer or your Internet access device with I V V six routing capabilities.
03:30
The last bullet point on this slide provides you with a link to a really good tunnel broker service, but feel free to search for others and give them a shot.
03:38
Another way to do this is by using 6 to 4 I p v six tunneling as described in RFC 30 56.
03:45
Essentially, this enables encapsulation of i P v six packets into I pee before for transport across in IBV six Network.
03:53
For those of you Cisco pros, this is essentially done using dual stacking, and it's pretty easy to accomplish.
04:00
Okay, so here are the command line options for using I P V six an end map.
04:05
Like I mentioned before, when you run in and maps can against a target that uses I V. V six, you simply need to add the Dash six option
04:13
or, if you like to type, you can use the dash Dash I P V six.
04:17
If you're scanning an I P V six target using its host name or address one of these command lines, which is is essential.
04:26
The next option is dash Capital s.
04:28
This command line switch allows you to specify the source address. In other words, you can use it to specify a source address other than your own.
04:35
Essentially, this is Ibv six spoofing
04:40
the third option here. Dash, dash, hop, dash, limit space number of hops sets the hot limit field and back. It's sent from your scanning station. This essentially determines how long data grams are allowed to exist on the network
04:54
and represents the number of hops a packet can take before being dropped.
04:58
It acts very similarly to T t l and I be before
05:02
the last bullet point. Here is a girl to the section in an online and map book that covers what I've talked about in this lesson.
05:11
It also provides you with a couple other I p v six command line options. In case you're interested
05:16
in this lesson, we went over the following first we discussed in General I v V six information with regards to end map.
05:24
Next we talked about and maps requirements for the use of I. P. V six and finally went. We went over some command line options you need to know in order to run and map scans against HPV. Six targets.
05:34
Thanks so much for watching, and I'll see you in the next lesson.

Up Next

NMAP

The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal.

Instructed By

Instructor Profile Image
Rob Thurston
CIO at Integrated Machinery Solutions
Instructor