Completed
Active Attacker - Windows (3)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploiting IPv6 Flow Label
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 IPv4 Address Exhaustion
- 3 IPv6 - History and Adoption
- 4 IPv6 Address Size
- 5 IPv6 Temporary Addresses
- 6 IPv6 - Flow Classification and the Flow Label
- 7 Windows - Flow Label Generation Algorithm (TCP & UDP) • The algorithm is based on hashing the destination address, source address, destination port and the source port
- 8 Linux/Android - Flow Label Generation Algorithm (stateless protocols)
- 9 Attack Concept - Summary
- 10 Active Attacker - Windows (1) UDP Case
- 11 Active Attacker - Windows (3)
- 12 Attacker Models
- 13 Conclusions