Most companies have not rolled out IPv6 strategically, but a lot of clients, servers, and mobile devices come with IPv6 enabled by default. For example, the default setting in Windows 7 and Windows Server 2008 is to prefer the IPv6 link-local address over the IPv4 address for network shares and management communication. While most companies have a tight grip on the IPv4 side of their networks, many don’t yet plan a rollout of or even audit the security of IPv6-enabled devices. This parallel universe is opening up new attack vectors.
In this webcast for IT security professionals and network engineers, HD Moore talks about risks introduced by IPv6-enabled devices on your network. Participants will learn about the following topics:
CSO and Chief Architect, Metasploit
HD is Chief Security Officer at Rapid7 and Chief Architect of Metasploit, the leading open-source penetration testing platform. HD founded the Metasploit Project in the summer of 2003 with the goal of becoming a public resource for exploit code research and development. Prior to joining Rapid7 and continuing his work on the Metasploit Framework, HD was the Director of Security Research at BreakingPoint Systems, where he focused on the content and security testing features of the BreakingPoint product line. Prior to BreakingPoint, HD spent seven years providing vulnerability assessments, leading penetration tests, and developing exploit code.