TECH TRAINING 7 – Professional Pentesting IPv6 Networks

Early Bird (< 30th June): SGD1499

Normal (> 1st July): SGD1999

This training course shows you how to perform penetration testing on IPv6 networks locally and remote – in theory and – mostly! – hands-on. Learn first hand from the developer of thc-ipv6 the tools and techniques that are specific for IPv6.

In Summer 2015, North America will run out of IPv4 addresses. But already today IPv6 is tentative available on every desktop and every server, as all operating systems support IPv6. Most ISPs have started to make IPv6 available and many Internet servers are now reachable.

This training explains the IPv6 issues, concentrating on the security vulnerabilities inherent in the protocol as well as configuration issues and implementation problems. Many known vulnerabilities are presented and students will be able to try them out themselves with supplied tools on the test network.

Please note that in previous trainings, also the defensive were shown. Due to the increased content required for the offensive part, this is not possible anymore. So it is now 2 days pure hacking IPv6  But there is a small part in the end now that shows what can be done (or not) against all the attacks presented.

Trainees will receive the current unpublished version of the thc-ipv6 protocol attack suite (which has more functionality than the public release).

On the first the trainer will invite you for a free drink – so don’t plan anything else for the first training evening.

Prerequisite Knowledge

Attendees must have basic knowledge in Linux, TCP/IP, penetration testing and IT security – the more the better.

Hardware / Software Requirements

Attendees should have a Laptop with Linux installed (either direct boot or virtual machine) and Ethernet adapter. Using Kali Linux in the newest release is highly recommended. If a virtual machine is being used, using VMware 8+ is highly recommended.


Day 1

  • Introduction to IPv6 (the mindset behind IPv6, how does it work, what is different to IPv4)
  • How to pentest IPv6 networks remotely
  • Making remote alive scans possible on IPv6
  • Remote protocol issues and attacks in IPv6 (NDP exhaustion, attacks on tunnels, ICMPv6 issues, etc.)
  • Remote vulnerabilities in IPv6 (problems in IP6, problems in ICMP6, etc.)
  • How to pentest IPv6 enabled services

Day 2

  • Introduction to local IPv6 protocol handling (NDP, address configuration, multicast)
  • How to pentest IPv6 networks locally
  • Local alive scans on IPv6
  • Local protocol issues and attacks in IPv6 (NDP security issues, bypassing security mechanisms, etc.)
  • Local IPv6 vulnerabilities (multicast MAC misuses, local ICMPv6 issues, etc.)
  • Special topics depending on interest on attendees (e.g. injecting into PPPoE, device testing framework, coding with thc-ipv6, etc.)
  • How to protect (or not) against all shown attack vectors

Location: Hotel Fort Canning Date: October 12, 2015 Time: 9:00 am - 6:00 pm Marc Heuse