SlideShare une entreprise Scribd logo
1  sur  42
www.progreso.com.sg1
IPv6 Cyber Security:
What Security Issues have you Missed Out?
6 September 2013
www.progreso.com.sg2
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg3
Myth on Increased Security
 IPv6 is more secure than IPv4, since
security was considered during the
design of the protocol and not as an
afterthought.
www.progreso.com.sg4
Myth on End-to-end Principle
 IPv6 will return the end-to-end
principle to the Internet,
hence security architectures
will switch from the network
to the hosts.
www.progreso.com.sg5
Myth on NAT
 IPv6 networks will be NAT-free.
www.progreso.com.sg6
Myth on Host Reconnaissance
 The massive IPv6 address space will make host
scanning unfeasible.
www.progreso.com.sg7
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg8
The New Cyber Landscape
- Multiple threat vectors
www.progreso.com.sg9
Attack Vectors on IPv6
 IPv6 addressing architecture
 Network reconnaissance
 Spoofing and smurf attacks
 Worms and viruses
 Main packet header + extension header issues
 IPv6 layer-2 and layer-3 security compromises
 Security on the routing infrastructure
 Vulnerabilities in transition mechanisms
www.progreso.com.sg10
Hacking Groups
Script kiddies
Political
Hacktivists
Crime Rings
State
Sponsored
Teams
www.progreso.com.sg11
Kiddie Scripts
www.progreso.com.sg12
Nmap Scanning
www.progreso.com.sg13
Vulnerability Scanning using Nessus
www.progreso.com.sg14
Packet Crafting
www.progreso.com.sg15
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg16
Dissecting an IPv6 Address
Global Routing Prefix
(length = a)
Subnet ID
(length = b)
Interface ID
(length = 128 - a – b)
www.progreso.com.sg17
Methods of Generating the IID
 EUI-64: Embedding the MAC
 Employ low-byte addresses
 Embed IPv4 address
 “Wordy” address
 Privacy or temporary address
 Transition/Coexistence mechanisms
www.progreso.com.sg18
EUI-64
IEEE OUI ff-fe Lower 24 bits of MAC
Known/searchable
(24 bits)
Fixed
(16 bits)
Unknown
(24 bits)
264 224
www.progreso.com.sg19
Low-Byte Addresses
2001:db8:1234:5678:0000:0000:0000:1234
2001:db8:1234:5678:0000:0000:0000:0001
2001:db8:1234:5678:0000:0000:0000:8888
264 216 or 28
www.progreso.com.sg20
Embedded IPv4 Addresses
2001:db8:1234:5678:0000:0000:c0a8:0101
2001:db8:1234:5678:0000:0000:0808:0808
264 232
8.8.8.8
192.168.1.1
www.progreso.com.sg21
Wordy Addresses
264 232
2001:db8:1234:5678:dec:1ded:c0:ffee
Dictionary-based scanning
2a03:2880:2110:3f02:face:b00c::
www.progreso.com.sg22
Privacy/Temporary Addresses
 RFC 4941
2001:db8:1234:5678:e24a:71c:d93f:7b0
2001:db8:1234:5678:0000:0000:0000:8888
Host is still compromised!
www.progreso.com.sg23
Transition/Coexistence Technologies
6to4 = 2002:c0a1:c0fe:1:2e0:18ff:fefb:7a25/48
ISATAP = fe80::5efe:c0a1:c0fe
NAT64 = 64:ff9b::c0a1:c0fe
www.progreso.com.sg24
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg25
IPv6 Education and Training
www.progreso.com.sg26
Upgrade Security Tools
www.progreso.com.sg27
Additional Configurations
www.progreso.com.sg28
Risks of Tunneling Protocols
www.progreso.com.sg29
New Features Adds Complexity
www.progreso.com.sg30
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg31
Transitions and Cybersecurity
www.progreso.com.sg32
Apply Rigorous Oversight
www.progreso.com.sg33
Leverage Accredited IPv6 Test Program
www.progreso.com.sg34
Don’t Get Intimidated
www.progreso.com.sg35
Incremental Deployment
www.progreso.com.sg36
Don’t Lose Sleep Over Dual Stacking
www.progreso.com.sg37
Agenda
 IPv6 Security Myths
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg38
IPv6 Security Measures
 Endpoint security
 Standalone firewalls
 Packet filters
 Data link level security
www.progreso.com.sg39
IPv6 Security Implementation Concerns
 IPv6 protocol stack vulnerabilities
 Lack of IPv6 exposure and operational experience
 Unintentional connectivity via tunneling
 Lack of first-hop security features
Application
TCP UDP
IPv4 IPv6
Data Link
www.progreso.com.sg40
Call to Action
 IPv6 is the future of the Internet
 There are significant differences between IPv4 and
IPv6
 Don’t lag behind in IPv6 knowledge
 Join now to learn more!
www.progreso.com.sg41
Are You Ready?
IPv6 Security

Contenu connexe

Tendances

slides-95-v6ops-0
slides-95-v6ops-0slides-95-v6ops-0
slides-95-v6ops-0
Mark Smith
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NAT
Mark Smith
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
Alexander Decker
 

Tendances (19)

WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
slides-95-v6ops-0
slides-95-v6ops-0slides-95-v6ops-0
slides-95-v6ops-0
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
AusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NATAusNOG 2016 - The Trouble with NAT
AusNOG 2016 - The Trouble with NAT
 
Vpn(4)
Vpn(4)Vpn(4)
Vpn(4)
 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
 
I psec
I psecI psec
I psec
 
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...
 
Feb-8-2012-Breaking-Wireless-Security
Feb-8-2012-Breaking-Wireless-SecurityFeb-8-2012-Breaking-Wireless-Security
Feb-8-2012-Breaking-Wireless-Security
 
Firewall
FirewallFirewall
Firewall
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
 
100197
100197100197
100197
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Having Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security AnalysisHaving Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security Analysis
 
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
 
Ipsec
IpsecIpsec
Ipsec
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 

En vedette

IPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolIPv6 and the IP Security Protocol
IPv6 and the IP Security Protocol
Miguel Luis
 

En vedette (16)

IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in general
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNSIPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
 
Network Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochureNetwork Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochure
 
E payment 2
E payment 2E payment 2
E payment 2
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
AF-23- IPv6 Security_Final
AF-23- IPv6 Security_FinalAF-23- IPv6 Security_Final
AF-23- IPv6 Security_Final
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
IPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolIPv6 and the IP Security Protocol
IPv6 and the IP Security Protocol
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Socket Programming in C++
Socket Programming in C++Socket Programming in C++
Socket Programming in C++
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6
 
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
 
IPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIESIPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIES
 

Similaire à IPv6 Security

Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
suvobgd
 
I pv6 addressing-rg-animated
I pv6 addressing-rg-animatedI pv6 addressing-rg-animated
I pv6 addressing-rg-animated
masbangkit
 
Get Ready For Ipv6
Get Ready For Ipv6Get Ready For Ipv6
Get Ready For Ipv6
technext1
 
Get Ready For Ipv6
Get Ready For Ipv6Get Ready For Ipv6
Get Ready For Ipv6
Rishu Mehra
 

Similaire à IPv6 Security (20)

CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
ip v6
ip v6ip v6
ip v6
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
I pv6 addressing-rg-animated
I pv6 addressing-rg-animatedI pv6 addressing-rg-animated
I pv6 addressing-rg-animated
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
 
IPvSeeYou.pdf
IPvSeeYou.pdfIPvSeeYou.pdf
IPvSeeYou.pdf
 
Get Ready For Ipv6
Get Ready For Ipv6Get Ready For Ipv6
Get Ready For Ipv6
 
Get Ready For Ipv6
Get Ready For Ipv6Get Ready For Ipv6
Get Ready For Ipv6
 
IPv6 address-planning
IPv6 address-planningIPv6 address-planning
IPv6 address-planning
 
IPv6 networking training sduffy v3
IPv6 networking training   sduffy v3IPv6 networking training   sduffy v3
IPv6 networking training sduffy v3
 
Charla ipv6
Charla ipv6Charla ipv6
Charla ipv6
 
Crash
CrashCrash
Crash
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
 
Ccna
Ccna Ccna
Ccna
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6
 
Modern networking for php developers (PHP Dorset)
Modern networking for php developers (PHP Dorset)Modern networking for php developers (PHP Dorset)
Modern networking for php developers (PHP Dorset)
 
what/why/how of IPv6 || 2002:3239:43c3::1
what/why/how of IPv6 || 2002:3239:43c3::1what/why/how of IPv6 || 2002:3239:43c3::1
what/why/how of IPv6 || 2002:3239:43c3::1
 
cisco-ws-c3560cx-12pd-s-datasheet.pdf
cisco-ws-c3560cx-12pd-s-datasheet.pdfcisco-ws-c3560cx-12pd-s-datasheet.pdf
cisco-ws-c3560cx-12pd-s-datasheet.pdf
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

IPv6 Security