TECH TRAINING 6 – RECENT ADVANCES IN IPV6 INSECURITIES
TRAINER: Marc ‘van Hauser’ Heuse (Founder, The Hackers Choice THC.org) |
CAPACITY: 20 pax |
SEATS LEFT: REGISTRATION CLOSED
|
DURATION: 2 days (8th & 9th April 2013) |
COST (per pax): EUR1499 (early bird) / EUR1899 (non early-bird) |
OVERVIEW
This workshop shows you how to perform penetration testing on IPv6 networks locally and remote – in theory and hands-on. It is the only workshop which supplies you with the necessary tools – especially for remote tests – which are nowhere else available.
Today IPv6 is available on every desktop and every server, as all operating systems since Windows XP and Linux Kernel 2.2 support IPv6. Hosting providers start to offer IPv6 addresses and networking. IPv6 is already available in corporations, e.g. all major mobile providers already support it on their backbones.
This training explains the IPv6 issues, concentrating on the security vulnerabilities inherent in the protocol as well as configuration issues and implementation problems. All so far known vulnerabilities are presented and students will be able to try them out themselves with supplied tools on the test network.
Trainees will not only receive the current unpublished version of the thc-ipv6 protocol attack suite (which has more functionality than the public release) but also receive direct development source code access for the future. Preventive and other security measures will be shown at the 2nd half of the second day.
REQUIREMENTS: Trainees must have basic knowledge in Linux, TCP/IP and IT security – the more the better.
HARDWARE/SOFTWARE REQUIREMENTS:
Trainees should have a Laptop with Linux (2.6 kernel) installed (either direct boot or virtual machine) and arrive with an Ethernet cable to be able to participate in the hands-on sessions. Using Backtrack 5R2 is recommended. If using a virtual machine, VMware 8+ must be used.
AGENDA:
-
Introduction to IPv6 (the mindset behind IPv6, how does it work, what is different to IPv4, new features)
-
Vulnerabilities in IPv6 (problems in IP6, problems in ICMP6, mobile IPv6
-
How to pentest IPv6 networks remotely
-
How to pentest IPv6 networks locally
-
Vulnerabilities with tunnel and migration issues (e.g. 6to4, Teredo,ISATAP), configuation issues, implementation problems) – includes lots of hands-on time (scanning local and remote networks, performing various man-in-the-middle attacks based on ICMP6, attacking dual stack systems, etc.)
-
Securing IPv6 systems and networks