This training course shows you how to perform penetration testing on IPv6 networks locally and remote – in theory and – mostly! – hands-on. Learn first hand from the developer of thc-ipv6 the tools and techniques that are specific for IPv6.
In Summer 2015, North America will run out of IPv4 addresses. But already today IPv6 is tentative available on every desktop and every server, as all operating systems support IPv6. Most ISPs have started to make IPv6 available and many Internet servers are now reachable.
This training explains the IPv6 issues, concentrating on the security vulnerabilities inherent in the protocol as well as configuration issues and implementation problems. Many known vulnerabilities are presented and students will be able to try them out themselves with supplied tools on the test network.
Please note that in previous trainings, also the defensive were shown. Due to the increased content required for the offensive part, this is not possible anymore. So it is now 2 days pure hacking IPv6 But there is a small part in the end now that shows what can be done (or not) against all the attacks presented.
Trainees will receive the current unpublished version of the thc-ipv6 protocol attack suite (which has more functionality than the public release).
On the first the trainer will invite you for a free drink – so don’t plan anything else for the first training evening.
Attendees must have basic knowledge in Linux, TCP/IP, penetration testing and IT security – the more the better.
Attendees should have a Laptop with Linux installed (either direct boot or virtual machine) and Ethernet adapter. Using Kali Linux in the newest release is highly recommended. If a virtual machine is being used, using VMware 8+ is highly recommended.