UsefulLinks
Computer Science
Cybersecurity
IPv6 Security and Networking
1. Introduction to IPv6
2. IPv6 Protocol Fundamentals
3. IPv6 Addressing
4. Internet Control Message Protocol for IPv6
5. IPv6 Address Autoconfiguration
6. IPv6 Routing
7. IPv4-to-IPv6 Transition Mechanisms
8. IPv6 Security Landscape
9. Common IPv6 Network Attacks
10. IPv6 Security Mitigation and Best Practices
11. Advanced IPv6 Topics
12. Enterprise IPv6 Deployment
8.
IPv6 Security Landscape
8.1.
Inherent Security Features
8.1.1.
IPsec Integration
8.1.1.1.
Authentication Header
8.1.1.2.
Encapsulating Security Payload
8.1.1.3.
Security Associations
8.1.1.4.
Internet Key Exchange
8.1.2.
Elimination of Broadcast Traffic
8.1.2.1.
Multicast-Only Communication
8.1.2.2.
Security Benefits
8.1.3.
Address Space Complexity
8.1.3.1.
Scanning Difficulty
8.1.3.2.
Reconnaissance Challenges
8.2.
New Attack Surfaces
8.2.1.
Reconnaissance and Scanning
8.2.1.1.
Address Space Scanning Challenges
8.2.1.2.
Multicast-Based Discovery
8.2.1.3.
Pattern-Based Scanning
8.2.2.
Large Subnet Vulnerabilities
8.2.2.1.
Host Discovery Difficulties
8.2.2.2.
Subnet Scanning Techniques
8.2.2.3.
Network Mapping Challenges
8.2.3.
Extension Header Exploitation
8.2.3.1.
Header Chain Manipulation
8.2.3.2.
Filtering Evasion
8.2.3.3.
Processing Vulnerabilities
8.2.4.
Fragmentation-Based Attacks
8.2.4.1.
Overlapping Fragments
8.2.4.2.
Resource Exhaustion
8.2.4.3.
Firewall Evasion
8.2.5.
Privacy and Tracking Concerns
8.2.5.1.
EUI-64 Based Tracking
8.2.5.2.
Device Fingerprinting
8.2.5.3.
Location Tracking
Previous
7. IPv4-to-IPv6 Transition Mechanisms
Go to top
Next
9. Common IPv6 Network Attacks