Computer NetworksNETWORKS

#HITBCyberWeek #CommSec The IPV6 Attack Must Be Understood – Jie Fu and KunZhe Chai & YongTao Wang



Due to the exhaustion of IPv4 free address space, the use of IPv6 on the Internet is gradually increasing. All Windows operating systems since Windows Vista have IPv6 enabled by default. IPv6 brings a series of improvements compared to IPV4, but these improvements are also put a double-edged sword.

Recently, we have been focusing on “IPv6” attack research and found that in the IPV6 environment, there are many attack points, such as: Iptables will fail, use IPV6 to bypass the Web defense strategy and abuse IPV6-specific protocols for man-in-the-middle attacks, and Other attack ideas!
In this speech, I will disclose the attack methods and ideas I have found for IPV6, and will also release tools for IPV6 attacks.

===

Leader of IoT Security Team in BCM Social Corp. His research focuses on embedded software, hardware security development and reverse development; the author of the first active NFC protective product “360SafeRFID”, and obtained numbers of more than 10 NFC security invention patents; International renowned security conference Blackhat, HackInTheBox, CanSecWest, POC speaker.

Chief Information Security Officer at BCM Social Corp, Founder of PegasusTeam and author of the well-known security tool MDK4. He is the maker of China’s first Wireless Security Defense Product Standard and he also is the world’s first inventor of Fake Base Stations defense technology, He leads his team to share the research results at HackInTheBox(HITB), HITCON, BlackHat, DEFCON, Cansecwest, CodeBlue, POC, etc. Follow him on Twitter at @swe3per.

Leader of Red Team in BCM Social Corp. He has profound experience in wireless security and penetration testing, and his research focuses on malware analysis, vulnerability exploitation. He shares research achievements at China Internet Security Conference (ISC), Blackhat, Codeblue, POC, CanSecWest, HackInTheBox, etc.

source
ipv6

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

Leave a Reply

Your email address will not be published. Required fields are marked *