Useful Links
Computer Science
Cybersecurity
IPv6 Security and Networking
1. Introduction to IPv6
2. IPv6 Protocol Fundamentals
3. IPv6 Addressing
4. Internet Control Message Protocol for IPv6
5. IPv6 Address Autoconfiguration
6. IPv6 Routing
7. IPv4-to-IPv6 Transition Mechanisms
8. IPv6 Security Landscape
9. Common IPv6 Network Attacks
10. IPv6 Security Mitigation and Best Practices
11. Advanced IPv6 Topics
12. Enterprise IPv6 Deployment
IPv6 Security Landscape
Inherent Security Features
IPsec Integration
Authentication Header
Encapsulating Security Payload
Security Associations
Internet Key Exchange
Elimination of Broadcast Traffic
Multicast-Only Communication
Security Benefits
Address Space Complexity
Scanning Difficulty
Reconnaissance Challenges
New Attack Surfaces
Reconnaissance and Scanning
Address Space Scanning Challenges
Multicast-Based Discovery
Pattern-Based Scanning
Large Subnet Vulnerabilities
Host Discovery Difficulties
Subnet Scanning Techniques
Network Mapping Challenges
Extension Header Exploitation
Header Chain Manipulation
Filtering Evasion
Processing Vulnerabilities
Fragmentation-Based Attacks
Overlapping Fragments
Resource Exhaustion
Firewall Evasion
Privacy and Tracking Concerns
EUI-64 Based Tracking
Device Fingerprinting
Location Tracking
Previous
7. IPv4-to-IPv6 Transition Mechanisms
Go to top
Next
9. Common IPv6 Network Attacks