The hacker community has started exploring IPv6, and they are constructing tools that leverage weaknesses, back doors and bypass firewalls in the protocol. In fact, IPv6 capabilities have started to be added to several popular hacker tools. Many of these IPv6 attack tools are already available and relatively easy to install and operate.