Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1


PRESENTATION MATERIALS

           

Photos and videos from all talks will be uploaded in the next couple of weeks. Please follow @HITBSecConf on Twitter or join our Facebook Group

TECH TRAINING 6 – RECENT ADVANCES IN IPV6 INSECURITIES

TRAINER: Marc ‘van Hauser’ Heuse (Founder, The Hackers Choice THC.org)

CAPACITY: 20 pax

SEATS LEFT: REGISTRATION CLOSED

DURATION: 2 days (8th & 9th April 2013)

COST (per pax): EUR1499 (early bird) / EUR1899 (non early-bird)

 

OVERVIEW

This workshop shows you how to perform penetration testing on IPv6 networks locally and remote – in theory and hands-on. It is the only workshop which supplies you with the necessary tools – especially for remote tests – which are nowhere else available.

Today IPv6 is available on every desktop and every server, as all operating systems since Windows XP and Linux Kernel 2.2 support IPv6. Hosting providers start to offer IPv6 addresses and networking. IPv6 is already available in corporations, e.g. all major mobile providers already support it on their backbones.

This training explains the IPv6 issues, concentrating on the security vulnerabilities inherent in the protocol as well as configuration issues and implementation problems. All so far known vulnerabilities are presented and students will be able to try them out themselves with supplied tools on the test network.

Trainees will not only receive the current unpublished version of the thc-ipv6 protocol attack suite (which has more functionality than the public release) but also receive direct development source code access for the future. Preventive and other security measures will be shown at the 2nd half of the second day.

REQUIREMENTS: Trainees must have basic knowledge in Linux, TCP/IP and IT security – the more the better.

HARDWARE/SOFTWARE REQUIREMENTS:

Trainees should have a Laptop with Linux (2.6 kernel) installed (either direct boot or virtual machine) and arrive with an Ethernet cable to be able to participate in the hands-on sessions. Using Backtrack 5R2 is recommended. If using a virtual machine, VMware 8+ must be used.

AGENDA:

  • Introduction to IPv6 (the mindset behind IPv6, how does it work, what is different to IPv4, new features)

  • Vulnerabilities in IPv6 (problems in IP6, problems in ICMP6, mobile IPv6

  • How to pentest IPv6 networks remotely

  • How to pentest IPv6 networks locally

  • Vulnerabilities with tunnel and migration issues (e.g. 6to4, Teredo,ISATAP), configuation issues, implementation problems) – includes lots of hands-on time (scanning local and remote networks, performing various man-in-the-middle attacks based on ICMP6, attacking dual stack systems, etc.)

  • Securing IPv6 systems and networks

ABOUT THE TRAINER

Marc ‘van Hauser’ Heuse (Founder, The Hackers Choice THC.org)

Marc “van Hauser” Heuse is performing security research since 1993, having found vulnerabilities in software like firewalls, DNS servers, SAP middleware, etc. and is the author of various well known security and pentest tools like hydra, amap, THC-Scan, secure_delete, SuSEFirewall and many more. He is performing security research on IPv6 since 2005 and has spoken on many conferences on this topic since then, among these are the CCC congress (Germany), Cansecwest (Canada), PacSec (Japan) and many more international conferences, and additionally has programmed the solely available pentest toolkit for ipv6: the thc-ipv6 protocol attack suite. In 1995 he founded the renowned security research group “The Hacker’s Choice”, which was the first group to e.g. crack A5 GSM in 2006 within a minute. Since 1997 he is working as a security consultant in the top-5 enterprise consultant companies, since 2007 he is working as an independant security consultant.

EVENT ORGANIZER

LOCAL PARTNER

PLATINUM SPONSOR

GOLD SPONSORS

>

TITANIUM SPONSOR (POST CONFERENCE RECEPTION + SPEAKER RECEPTION)

SILVER SPONSORS


CTF SPONSOR

ALCO_PWN SPONSOR (POST CONFERENCE PARTY)

CTF PRIZE SPONSOR

NETWORK SPONSORS AND UPLINK

ADDITIONAL SUPPORT BY

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2012 Hack In The Box | http://www.hackinthebox.org