A Parallel Universe: Identifying IPv6 Security Risks in IPv4 Networks

Most companies have not rolled out IPv6 strategically, but a lot of clients, servers, and mobile devices come with IPv6 enabled by default. For example, the default setting in Windows 7 and Windows Server 2008 is to prefer the IPv6 link-local address over the IPv4 address for network shares and management communication. While most companies have a tight grip on the IPv4 side of their networks, many don’t yet plan a rollout of or even audit the security of IPv6-enabled devices. This parallel universe is opening up new attack vectors.

In this webcast for IT security professionals and network engineers, HD Moore talks about risks introduced by IPv6-enabled devices on your network. Participants will learn about the following topics:

  • Introduction to IPv6 security risks 
  • IPv6 default settings of current operating systems 
  • IPv6 configurations on firewalls and IDS/IPS 
  • Auditing for IPv6 risks on a network with Metasploit
  • Live Metasploit Demo

HD Moore
CSO and Chief Architect, Metasploit

moore-headshot.jpgHD is Chief Security Officer at Rapid7 and Chief Architect of Metasploit, the leading open-source penetration testing platform. HD founded the Metasploit Project in the summer of 2003 with the goal of becoming a public resource for exploit code research and development. Prior to joining Rapid7 and continuing his work on the Metasploit Framework, HD was the Director of Security Research at BreakingPoint Systems, where he focused on the content and security testing features of the BreakingPoint product line. Prior to BreakingPoint, HD spent seven years providing vulnerability assessments, leading penetration tests, and developing exploit code.

On-Demand Webcast

To watch this on-demand webcast, fill out the form below!