<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>6lab.cz | RSS Feed</title>
	<atom:link href="http://6lab.cz/category/videos/feed/" rel="self" type="application/rss+xml" />
	<link>http://6lab.cz</link>
	<description>Networking, IPv6, Security</description>
	<lastBuildDate>Tue, 24 Oct 2017 08:54:46 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.1</generator>
	<item>
		<title>Bypassing ACL using extension headers</title>
		<link>http://6lab.cz/bypassing-acl-using-extension-headers/</link>
		<comments>http://6lab.cz/bypassing-acl-using-extension-headers/#comments</comments>
		<pubDate>Wed, 06 Nov 2013 14:34:01 +0000</pubDate>
		<dc:creator><![CDATA[Matej Gregr]]></dc:creator>
				<category><![CDATA[IPv6]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Videos]]></category>

		<guid isPermaLink="false">http://6lab.cz/?p=1849</guid>
		<description><![CDATA[The video demonstrates how to bypass an access control list on HP A5800 switch using IPv6 and extension headers. The attacker uses kernel modul which adds empty destination-options headers to the whole TCP session, thus is able to connect to any service on the server. The video is temporarily removed ... <a href="http://6lab.cz/bypassing-acl-using-extension-headers/" class="more-link">Read More</a>]]></description>
				<content:encoded><![CDATA[<p>The video demonstrates how to bypass an access control list on HP A5800 switch using IPv6 and extension headers. The attacker uses kernel modul which adds empty destination-options headers to the whole TCP session, thus is able to connect to any service on the server.</p>
<p><strong>The video is temporarily removed on request from the HP Security team.</strong></p>
<div  class="x-author-box cf" ><h6 class="h-about-the-author">About the main author</h6><div class="x-author-info"><h4 class="h-author mtn">Matej Gregr</h4><a href="http://www.fit.vutbr.cz/~igregr/" class="x-author-social" title="Visit the website for Matej Gregr" target="_blank"><i class="x-icon-globe"></i> http://www.fit.vutbr.cz/~igregr/</a><span class="x-author-social"><i class="x-icon-envelope"></i> igregr@fit.vutbr.cz</span><p class="p-author mbn">PhD student at Brno University of Technology. He teaches network related courses and his research concerns IPv6 security, monitoring and deployment. He works also as a network administrator at Brno campus network and participates in the European project - GÉAN3 Campus Best Practice.</p></div></div>
]]></content:encoded>
			<wfw:commentRss>http://6lab.cz/bypassing-acl-using-extension-headers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fake router detection &#8211; practical experience</title>
		<link>http://6lab.cz/fake-router-detection-practical-experience/</link>
		<comments>http://6lab.cz/fake-router-detection-practical-experience/#comments</comments>
		<pubDate>Mon, 11 Apr 2011 16:33:20 +0000</pubDate>
		<dc:creator><![CDATA[Matej Gregr]]></dc:creator>
				<category><![CDATA[IPv6]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Videos]]></category>

		<guid isPermaLink="false">http://ipv6.vutbr.cz/?p=895</guid>
		<description><![CDATA[6to4 (RFC 3056) is a transition mechanism allowing users to communicate with IPv6 enabled sites and services with minimal manual configuration. Globally unique IPv4 address is the only prerequisite. Together with anycast prefix for 6to4 routers (defined in RFC 3068) provides a simple solution, how even an end site can ... <a href="http://6lab.cz/fake-router-detection-practical-experience/" class="more-link">Read More</a>]]></description>
				<content:encoded><![CDATA[<p>6to4 (RFC 3056) is a transition mechanism allowing users to communicate with IPv6 enabled sites and services with minimal manual configuration.  Globally unique IPv4 address is the only prerequisite. Together with anycast prefix for 6to4 routers (defined in RFC 3068) provides a simple solution, how even an end site can obtain IPv6 connectivity. The mechanism is implemented in all major operation systems. The presentation is focused on problems in local area networks caused by 6to4 implementation in  Windows Vista/7.  Several monitoring tools are presented, unfortunately, the tools can protect a network only againts missconfigured hosts. The only proper solution is filtering malicious traffic on all access ports. However, the implementation is still not available on most networking equipment.<span id="more-895"></span></p>
<p><iframe width="560" height="315" src="https://www.youtube.com/embed/rADg_cTe9Pw" frameborder="0" allowfullscreen></iframe></p>
<div  class="x-author-box cf" ><h6 class="h-about-the-author">About the Author</h6><div class="x-author-info"><h4 class="h-author mtn">Matej Gregr</h4><a href="http://www.fit.vutbr.cz/~igregr/" class="x-author-social" title="Visit the website for Matej Gregr" target="_blank"><i class="x-icon-globe"></i> http://www.fit.vutbr.cz/~igregr/</a><span class="x-author-social"><i class="x-icon-envelope"></i> igregr@fit.vutbr.cz</span><p class="p-author mbn">PhD student at Brno University of Technology. He teaches network related courses and his research concerns IPv6 security, monitoring and deployment. He works also as a network administrator at Brno campus network and participates in the European project - GÉAN3 Campus Best Practice.</p></div></div>
]]></content:encoded>
			<wfw:commentRss>http://6lab.cz/fake-router-detection-practical-experience/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
