IPv6 Security Summit

From March 16, 2015 to March 17, 2015

The “IPv6 Security Summit” is a special two-day convention in the context of the Troopers security conference. It will be run in two tracks of both half-day workshops and 90 min. presentations on specific topics. The goal is to foster the discussion of IPv6 security aspects & issues and to provide practical advice for security officers, network planners and practitioners in the IPv6 security field.

A number of international speakers will provide talks covering latest attack techniques & defense strategies, current developments in the standardization space and case studies from various environments.

Time Track 1 Track 2

Opening Remarks

MLD Considered Harmful – Breaking Another IPv6 Subprotocol

Basic Attacks & Defences - Part 1

Break

Routing Header Is back... Should We Panic?

Basic Attacks & Defences - Part 2

Managing Security Incidents in an IPv6 World

Basic Attacks & Defences - Part 3

Lunch

IPv6 Microsegmentation Done Right

Evading Intrusion Detection/Prevention Systems by Exploiting IPv6 Features

Tales of 6006 Protocols, or how I Learned to Stop Worrying and Love Parsers

Evading Intrusion Detection/Prevention Systems by Exploiting IPv6 Features

Break

.1.3.6.1.2.1.4.31.1.1 - Hello, anybody there?

New Features of the SI6 Networks'IPv6 Toolkit

Time Track 1 Track 2 Track 3

Deploying IPv6 Securely - Avoiding Mistakes Others Have Made

Recent IPv6 Security Standardization Efforts

IPv6 in Wireshark - a Hands-on Workshop - Part 1

Break

Reliable & Secure DHCPv6

Case Study: Building a Secure IPv6 Guest Wifi Network

IPv6 in Wireshark - a Hands-on Workshop - Part 2

Reliable & Secure DHCPv6 - Continued

Case Study: Building a Secure IPv6 Guest Wifi Network

IPv6 in Wireshark - a Hands-on Workshop - Part 2

Lunch

IPv6 First Hop Security in Virtualized Environments

Advanced IPv6 Attacks Using Chiron. Hands-On Workshop - Part 1

Break

Enabling and Securing IPv6 in Service Provider Networks

Advanced IPv6 Attacks Using Chiron. Hands-On Workshop - Part 2

/48 Considered Harmful? On the Interaction of Strict IPv6 Prefix Filtering and the Needs of Enterprise LIRs

Advanced IPv6 Attacks Using Chiron. Hands-On Workshop - Part 2