BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//conference.wireshark.org//sharkfest-25-europe-2025//talk
 //BEGBHS
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-sharkfest-25-europe-2025-BEGBHS@conference.wireshark.org
DTSTART;TZID=CET:20251106T163000
DTEND;TZID=CET:20251106T173000
DESCRIPTION:Modern operating systems ship with native IPv6 support and dual
  stack configurations enabled by default. While this is essential for comp
 rehensive connectivity\, it introduces subtle yet critical security risks 
 - especially in environments still predominantly focusing on IPv4 and IPv4
  security.\nThis talk provides an overview of dynamic IPv6 configuration o
 ptions and explores how attackers can exploit IPv6 capabilities to comprom
 ise IPv4 networks. We will demonstrate how IPv6 features - such as SLAAC\,
  Router Advertisements\, and DHCPv6 - can be weaponized in dual stack setu
 ps. For this\, we will use Wireshark to analyze different types of attacks
  and the corresponding behaviors of the targeted operating systems at the 
 packet level. Finally\, we will conclude our talk with recommended mitigat
 ion strategies for the identified issues.
DTSTAMP:20260413T042540Z
LOCATION:Grand Ballroom Salons CDE
SUMMARY:Attacking IPv4 Networks with IPv6: Security Implications of Dual St
 ack and native IPv6 Support - Gabor Österreicher\, Stefan Machherndl
URL:https://conference.wireshark.org/sharkfest-25-europe-2025/talk/BEGBHS/
END:VEVENT
END:VCALENDAR
