TECH TRAINING 8: Professional Pentesting IPv6 Networks


CAPACITY: 20 pax


PRICE: EUR1499 (early bird)

EUR1999 (normal)

Early bird registration rate ends on the 1st of March


This training course shows you how to perform penetration testing on IPv6 networks locally and remote – in theory and – mostly! – hands-on. Learn first hand from the developer of thc-ipv6 the tools and techniques that are specific for IPv6.

In Summer 2015, North America will run out of IPv4 addresses. But already today IPv6 is tentative available on every desktop and every server, as all operating systems support IPv6. Most ISPs have started to make IPv6 available and many Internet servers are now reachable.

This training explains the IPv6 issues, concentrating on the security vulnerabilities inherent in the protocol as well as configuration issues and implementation problems. Many known vulnerabilities are presented and students will be able to try them out themselves with supplied tools on the test network.

Please note that in previous trainings, also the defensive were shown. Due to the increased content required for the offensive part, this is not possible anymore. So it is now 2 days pure hacking IPv6  But there is a small part in the end now that shows what can be done (or not) against all the attacks presented.

Trainees will receive the current unpublished version of the thc-ipv6 protocol attack suite (which has more functionality than the public release).

On the first the trainer will invite you for a free drink – so don’t plan anything else for the first training evening.


Day 1

  • Introduction to IPv6 (the mindset behind IPv6, how does it work, what is different to IPv4)
  • How to pentest IPv6 networks remotely
  • Making remote alive scans possible on IPv6
  • Remote protocol issues and attacks in IPv6 (NDP exhaustion, attacks on tunnels, ICMPv6 issues, etc.)
  • Remote vulnerabilities in IPv6 (problems in IP6, problems in ICMP6, etc.)
  • How to pentest IPv6 enabled services

Day 2

  • Introduction to local IPv6 protocol handling (NDP, address configuration, multicast)
  • How to pentest IPv6 networks locally
  • Local alive scans on IPv6
  • Local protocol issues and attacks in IPv6 (NDP security issues, bypassing security mechanisms, etc.)
  • Local IPv6 vulnerabilities (multicast MAC misuses, local ICMPv6 issues, etc.)
  • Special topics depending on interest on attendees (e.g. injecting into PPPoE, device testing framework, coding with thc-ipv6, etc.)
  • How to protect (or not) against all shown attack vectors

Student Requirements

Attendees must have basic knowledge in Linux, TCP/IP, penetration testing and IT security – the more the better.

What to Bring

Attendees should have a Laptop with Linux installed (either direct boot or virtual machine) and Ethernet adapter. Using Kali Linux in the newest release is highly recommended. If a virtual machine is being used, using VMware 8+ is highly recommended.

Location: De Beurs van Berlage Date: May 26, 2015 Time: 9:00 am - 6:00 pm Marc Heuse