This chapter covers the following subjects:
Reintroduction to IPv6: Brief overview of IPv6
IPv6 Update: Describes the current state of IPv6 adoption
IPv6 Vulnerabilities: Describes the weaknesses in IPv6 that are key areas of focus
Hacker Experience: Covers the current state of attack tools and skills
IPv6 Security Mitigation Techniques: Introduces the high-level methods of securing IPv6
The Internet Protocol (IP) is the most widely used communications protocol. Because it is the most pervasive communication technology, it is the focus of hundreds of thousands of IT professionals like you. Because so many people rely on the protocol, the safety of communications is top of mind. The security research that is performed ...