National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
An Analysis of Selected IPv6 Network Attacks
Pivarník, Jozef ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
This master's thesis analyses and demonstrates selected IPv6 attacks including two Man-in-the-Middle attacks and one Denial of Service attack - Rogue Router Advertisement, Neighbor Cache Poisoning and Duplicate Address Detection DoS, respectively. In the first part the author presents necessary information related to the issue and provides detailed information on how to realize these attacks in practice using publicly available tools. The second part of the thesis presents various ways of mitigating presented attacks, analyses implementations of some of those countermeasures on Cisco and H3C devices and discussess their applicability.
Security testing of selected communication protocols and related vulnerabilities
Kuklovský, Adam ; Langhammer, Lukáš (referee) ; Jeřábek, Jan (advisor)
This master’s thesis extensively addresses the functionality and characteristics of the IPv6 protocol and its control protocol ICMPv6. Furthermore, the thesis discusses methods of penetration testing and technologies used in creating the testing environment. A key output of this work is a network scanning tool that has been compared with the popular Wireshark program. The conclusion describes the structure of the proposed tool and suggests possibilities for its future development and improvement.
An Analysis of Selected IPv6 Network Attacks
Pivarník, Jozef ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
This master's thesis analyses and demonstrates selected IPv6 attacks including two Man-in-the-Middle attacks and one Denial of Service attack - Rogue Router Advertisement, Neighbor Cache Poisoning and Duplicate Address Detection DoS, respectively. In the first part the author presents necessary information related to the issue and provides detailed information on how to realize these attacks in practice using publicly available tools. The second part of the thesis presents various ways of mitigating presented attacks, analyses implementations of some of those countermeasures on Cisco and H3C devices and discussess their applicability.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.