www.progreso.com.sg1
IPv6 Cyber Security:
What Security Issues have you Missed Out?
6 September 2013
www.progreso.com.sg2
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg3
Myth on Increased Security
 IPv6 is more secure than IPv4, since
security was considered during the
design of the protocol and not as an
afterthought.
www.progreso.com.sg4
Myth on End-to-end Principle
 IPv6 will return the end-to-end
principle to the Internet,
hence security architectures
will switch from the network
to the hosts.
www.progreso.com.sg5
Myth on NAT
 IPv6 networks will be NAT-free.
www.progreso.com.sg6
Myth on Host Reconnaissance
 The massive IPv6 address space will make host
scanning unfeasible.
www.progreso.com.sg7
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg8
The New Cyber Landscape
- Multiple threat vectors
www.progreso.com.sg9
Attack Vectors on IPv6
 IPv6 addressing architecture
 Network reconnaissance
 Spoofing and smurf attacks
 Worms and viruses
 Main packet header + extension header issues
 IPv6 layer-2 and layer-3 security compromises
 Security on the routing infrastructure
 Vulnerabilities in transition mechanisms
www.progreso.com.sg10
Hacking Groups
Script kiddies
Political
Hacktivists
Crime Rings
State
Sponsored
Teams
www.progreso.com.sg11
Kiddie Scripts
www.progreso.com.sg12
Nmap Scanning
www.progreso.com.sg13
Vulnerability Scanning using Nessus
www.progreso.com.sg14
Packet Crafting
www.progreso.com.sg15
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg16
Dissecting an IPv6 Address
Global Routing Prefix
(length = a)
Subnet ID
(length = b)
Interface ID
(length = 128 - a – b)
www.progreso.com.sg17
Methods of Generating the IID
 EUI-64: Embedding the MAC
 Employ low-byte addresses
 Embed IPv4 address
 “Wordy” address
 Privacy or temporary address
 Transition/Coexistence mechanisms
www.progreso.com.sg18
EUI-64
IEEE OUI ff-fe Lower 24 bits of MAC
Known/searchable
(24 bits)
Fixed
(16 bits)
Unknown
(24 bits)
264 224
www.progreso.com.sg19
Low-Byte Addresses
2001:db8:1234:5678:0000:0000:0000:1234
2001:db8:1234:5678:0000:0000:0000:0001
2001:db8:1234:5678:0000:0000:0000:8888
264 216 or 28
www.progreso.com.sg20
Embedded IPv4 Addresses
2001:db8:1234:5678:0000:0000:c0a8:0101
2001:db8:1234:5678:0000:0000:0808:0808
264 232
8.8.8.8
192.168.1.1
www.progreso.com.sg21
Wordy Addresses
264 232
2001:db8:1234:5678:dec:1ded:c0:ffee
Dictionary-based scanning
2a03:2880:2110:3f02:face:b00c::
www.progreso.com.sg22
Privacy/Temporary Addresses
 RFC 4941
2001:db8:1234:5678:e24a:71c:d93f:7b0
2001:db8:1234:5678:0000:0000:0000:8888
Host is still compromised!
www.progreso.com.sg23
Transition/Coexistence Technologies
6to4 = 2002:c0a1:c0fe:1:2e0:18ff:fefb:7a25/48
ISATAP = fe80::5efe:c0a1:c0fe
NAT64 = 64:ff9b::c0a1:c0fe
www.progreso.com.sg24
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg25
IPv6 Education and Training
www.progreso.com.sg26
Upgrade Security Tools
www.progreso.com.sg27
Additional Configurations
www.progreso.com.sg28
Risks of Tunneling Protocols
www.progreso.com.sg29
New Features Adds Complexity
www.progreso.com.sg30
Agenda
 IPv6 Security Myths
 IPv6 Security Compromises
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg31
Transitions and Cybersecurity
www.progreso.com.sg32
Apply Rigorous Oversight
www.progreso.com.sg33
Leverage Accredited IPv6 Test Program
www.progreso.com.sg34
Don’t Get Intimidated
www.progreso.com.sg35
Incremental Deployment
www.progreso.com.sg36
Don’t Lose Sleep Over Dual Stacking
www.progreso.com.sg37
Agenda
 IPv6 Security Myths
 Network Reconnaissance in IPv6
 IPv6 for Security Practitioners
 Ensuring Cybersecurity in IPv6 Transitions
 IPv6 Security Implementations
www.progreso.com.sg38
IPv6 Security Measures
 Endpoint security
 Standalone firewalls
 Packet filters
 Data link level security
www.progreso.com.sg39
IPv6 Security Implementation Concerns
 IPv6 protocol stack vulnerabilities
 Lack of IPv6 exposure and operational experience
 Unintentional connectivity via tunneling
 Lack of first-hop security features
Application
TCP UDP
IPv4 IPv6
Data Link
www.progreso.com.sg40
Call to Action
 IPv6 is the future of the Internet
 There are significant differences between IPv4 and
IPv6
 Don’t lag behind in IPv6 knowledge
 Join now to learn more!
www.progreso.com.sg41
Are You Ready?
IPv6 Security

More Related Content

PDF
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
PDF
Security Issues in Next Generation IP and Migration Networks
PPT
05 06 ike
PDF
DNS как линия защиты/DNS as a Defense Vector
PPTX
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
PPTX
PDF
Строим ханипот и выявляем DDoS-атаки
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Security Issues in Next Generation IP and Migration Networks
05 06 ike
DNS как линия защиты/DNS as a Defense Vector
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
Строим ханипот и выявляем DDoS-атаки

What's hot (19)

PPTX
WPA3 - What is it good for?
PDF
slides-95-v6ops-0
PPTX
IPSec and VPN
PDF
Introduction to and survey of TLS Security
PPTX
WPA-3: SEA and Dragonfly
PDF
AusNOG 2016 - The Trouble with NAT
PPT
Vpn(4)
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
PPT
I psec
PDF
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...
ODP
Feb-8-2012-Breaking-Wireless-Security
PPT
Firewall
PDF
Look at ipv6 security advantages over ipv4
PDF
PPT
How to hack wireless internet connections using aircrack-ng
PDF
Having Honeypot for Better Network Security Analysis
PDF
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
PPT
PPT
WPA3 - What is it good for?
slides-95-v6ops-0
IPSec and VPN
Introduction to and survey of TLS Security
WPA-3: SEA and Dragonfly
AusNOG 2016 - The Trouble with NAT
Vpn(4)
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
I psec
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...
Feb-8-2012-Breaking-Wireless-Security
Firewall
Look at ipv6 security advantages over ipv4
How to hack wireless internet connections using aircrack-ng
Having Honeypot for Better Network Security Analysis
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
Ad

Viewers also liked (16)

PPTX
IPv6 Security Challenges: TechNet Augusta 2015
PPTX
Eric Vyncke - IPv6 security in general
PDF
IPv6 Security - Where is the Challenge?
PPTX
Survey on IPv6 security issues
PDF
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
PDF
Network Utility Force IPv6 training brochure
PPT
E payment 2
PDF
IPv6 Security - Myths and Reality
PPTX
AF-23- IPv6 Security_Final
PDF
The IPv6 Snort Plugin (at DeepSec 2014)
PDF
IPv6 and the IP Security Protocol
PDF
Snooping TCP
PDF
Socket Programming in C++
PPTX
Implementation & Challenges of IPv6
DOCX
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
KEY
IPV6 SIMPLE SECURITY CAPABILITIES
IPv6 Security Challenges: TechNet Augusta 2015
Eric Vyncke - IPv6 security in general
IPv6 Security - Where is the Challenge?
Survey on IPv6 security issues
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
Network Utility Force IPv6 training brochure
E payment 2
IPv6 Security - Myths and Reality
AF-23- IPv6 Security_Final
The IPv6 Snort Plugin (at DeepSec 2014)
IPv6 and the IP Security Protocol
Snooping TCP
Socket Programming in C++
Implementation & Challenges of IPv6
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
IPV6 SIMPLE SECURITY CAPABILITIES
Ad

Similar to IPv6 Security (20)

PPTX
CCNA v6.0 ITN - Chapter 08
PPT
PDF
Cisco Ccna In 60 Days Paul Browning Farai Tafa Daniel Gheorghe Browning
PPT
Internet Protocol Version 6 By Suvo 2002
PPTX
I pv6 addressing-rg-animated
PPTX
Getting started with IPv6
PDF
Things I wish I had known about IPv6 before I started
PDF
IPvSeeYou.pdf
PPTX
Get Ready For Ipv6
PPTX
Get Ready For Ipv6
PDF
IPv6 address-planning
PPT
IPv6 networking training sduffy v3
PDF
Charla ipv6
PPT
Cisco CCNA module 2
PPT
Ccna
PDF
Short Introduction to IPv6
PDF
Modern networking for php developers (PHP Dorset)
PPTX
what/why/how of IPv6 || 2002:3239:43c3::1
PDF
cisco-ws-c3560cx-12pd-s-datasheet.pdf
CCNA v6.0 ITN - Chapter 08
Cisco Ccna In 60 Days Paul Browning Farai Tafa Daniel Gheorghe Browning
Internet Protocol Version 6 By Suvo 2002
I pv6 addressing-rg-animated
Getting started with IPv6
Things I wish I had known about IPv6 before I started
IPvSeeYou.pdf
Get Ready For Ipv6
Get Ready For Ipv6
IPv6 address-planning
IPv6 networking training sduffy v3
Charla ipv6
Cisco CCNA module 2
Ccna
Short Introduction to IPv6
Modern networking for php developers (PHP Dorset)
what/why/how of IPv6 || 2002:3239:43c3::1
cisco-ws-c3560cx-12pd-s-datasheet.pdf

Recently uploaded (20)

PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
DOCX
search engine optimization ppt fir known well about this
PPTX
Configure Apache Mutual Authentication
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
OpenACC and Open Hackathons Monthly Highlights July 2025
Taming the Chaos: How to Turn Unstructured Data into Decisions
Benefits of Physical activity for teenagers.pptx
STKI Israel Market Study 2025 version august
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
sbt 2.0: go big (Scala Days 2025 edition)
Credit Without Borders: AI and Financial Inclusion in Bangladesh
search engine optimization ppt fir known well about this
Configure Apache Mutual Authentication
Module 1.ppt Iot fundamentals and Architecture
The influence of sentiment analysis in enhancing early warning system model f...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A review of recent deep learning applications in wood surface defect identifi...
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Abstractive summarization using multilingual text-to-text transfer transforme...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game

IPv6 Security