Schlagwort-Archive: IPv6

We are pleased to announce two upcoming training offers which we have prepared in cooperation with HM Training Solutions and two international speakers:

Penetration Testing in IPv6 Networks – A Hands-On Workshop” in German held by Marc “van Hauser” Heuse on November 4th-5th 2013:

This training course shows you how to perform penetration testing on IPv6 networks locally and remote – in theory and hands-on. Learn first hand from the developer of the tools and techniques that are specific for IPv6. Additionally, security in deploying IPv6 is taught from network design to firewall, router and system configuration hardening. Today IPv6 is available on every desktop and every server, as all operating systems support IPv6. Most ISPs have started to make IPv6 available and on several continents you don´t get additional IPv4 addresses unless you have an IPv6 rollout started. This training explains the IPv6 issues, concentrating on the security vulnerabilities inherent in the protocol as well as configuration issues and implementation problems. Many known vulnerabilities are presented and students will be able to try them out themselves with supplied tools on the test network. Then – switching sides – it is explained how to secure IPv6 systems (Windows, Linux, Cisco routers, Netscreen & Fortinet & ASA firewalls) and especially large networks including routing and how to solve the difficult firewalling questions which arise with IPv6. New advances like SEND, new DHCP6 developments etc. are included.
The ratio of hacking vs. securing is 2:1.
Trainees will receive the current unpublished version of the thc-ipv6 protocol attack suite (which has more functionality than the public release).
Because of the huge amount content, the training on the first day will be longer, and in the evening enjoy a free beer with the trainer and the rest of the group – so don’t plan anything else for the first training evening.

Advanced Attack Techniques against IPv6 Networks” in English held by Dr. Antonios Atlasis on November 6th 2013.

IPv6 is at the gates. Although not widely deployed yet, the latest statistics show that it is not only Asia where the demand on IPv6 has increased significantly, but also in some countries in Europe, including Norway, the Netherlands, Sweden and Germany. In this workshop, after discussing some of the new features that IPv6 brings with it, focusing on the IPv6 Header and the IPv6 Extension Extension Headers, we shall discuss several security implications of misusing them. Specific examples that can lead to Denial of Service attacks, IDS insertion/evasion or even firewall evasion will be presented. Then, it will be shown how you can use Scapy to craft your own legitimate or malformed IPv6 packets and subsequently, to launch the prescribed attacks on your own. The participants of the workshop will have the opportunity to test what they will learn during the workshop in a virtual lab environment (the necessary virtual images of the …targets will be provided). Only by knowing the potential IPv6 security issues we shall be able to protect it effectively. The acquired knowledge will be valuable both to penetration testers who want to test IPv6 networks as well as to network security engineers who want to protect effectively their IPv6 networks.

We are looking forward to two interesting workshops with you!

Wir freuen uns Ihnen mitteilen zu dürfen dass wir zwei Workshop-Angebote in Kooperation mit HM Training Solutions und zwei internationalen Sprechern für Sie vorbereitet haben:

Wir freuen uns auf zwei interessante Workshops mit Ihnen!

We are pleased to announce two upcoming training offers which we have prepared in cooperation with HM Training Solutions and two international speakers:

We are looking forward to two interesting workshops with you!

Frankfurt, 12-13 May 2011

Sprecher: Enno Rey & Christopher Werny

In vielen Umgebungen gibt es Sicherheitsbedenken zum Einsatz von IPv6 im LAN. Diese drehen sich typischerweise um drei Bereiche: das veränderte Konfigurationsparadigma und sich daraus ergebenden Angriffsmöglichkeiten (z.B. durch gespoofte RAs), die Furcht vor unabsichtlichem globalem Routing eigentlich organisationsinterner Adressen und v.a. die Sorge um die Aushebelung von Sicherheitsmechanismen durch Tunneltechnologien.

Ziel des Vortrags ist, den aktuellen Stand der Technik hinsichtlich des Default-Verhaltungs typischer Client-OS und möglicher Sicherungsansätze auf Netzwerkebene (z.B. SEND, RA Guard, NAT) darzustellen. Für alle diskutierten Technologien werden praktische Beispiele gezeigt und die operationellen Auswirkungen im Verhältnis zu den Sicherheitsaspekten erörtert.


it security 2011

München, 16.-18. May 2011

Workshop: IPv6-Sicherheit in LANs (Christopher Werny)

Vortrag: Integration des neuen Personalausweises in Enterprise-Umgebungen: Chancen, Aufwände, Gefahren (Friedwart Kuhn)

Vortrag: Sicherheit von Multifunktionsgeräten in Unternehmen (Matthias Luft)

Komplette Agenda: