IPv6 Security Overview

IPv6 Security Overview

The paper considers the new Internet Protocol (IPv6 or IPng) that is about to replace the old IPv4. The arguments come from reading some texts about it, with a point of view to security that is expected. It also quickly shows the possible evolution of today's most common cyber attacks, as well as some technical details about the suite of IPSec protocols, because its security model will be required to be supported by all IPv6 implementations. It's possible to read this document on GoGo6.com … [Read more]

(D)DOS: Practical Approach – Hakin9.org – IT Security Magazine

(D)DOS: Practical Approach - Hakin9.org - IT Security Magazine

Hakin9 IT Security Magazine published an article of mine about a practical approach to (D)DoS attacks. In this paper are showed several offensive practices on how to conduct a DDoS attack, with a strong hand on techniques, tools and code chunks. There are also present screenshots and link references to the authors of the various exploits used (when used), as well as even a simple client-server C SYN Flood program created by me in order to better explain how botnets work... Look it on Hakin9 … [Read more]

(D)DoS: Mitigation Strategies

(D)DoS: Mitigation Strategies

DDoS, or Distributed Denial of Service, is a cyber-attack in which an attacker tries to bring the functioning of a computer system that provides a service, such as a website, to the limit of its performance, generally working on one of the input parameters until it is no longer capable of delivering the service. These attacks are usually carried out by sending many packets of requests against the targeted service, saturating its resources and making the system “unstable,” thereby preventing … [Read more]