Completed
Attacker Models
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploiting IPv6 Flow Label
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 IPv4 Address Exhaustion
- 3 IPv6 - History and Adoption
- 4 IPv6 Address Size
- 5 IPv6 Temporary Addresses
- 6 IPv6 - Flow Classification and the Flow Label
- 7 Windows - Flow Label Generation Algorithm (TCP & UDP) • The algorithm is based on hashing the destination address, source address, destination port and the source port
- 8 Linux/Android - Flow Label Generation Algorithm (stateless protocols)
- 9 Attack Concept - Summary
- 10 Active Attacker - Windows (1) UDP Case
- 11 Active Attacker - Windows (3)
- 12 Attacker Models
- 13 Conclusions