Hasso-Plattner-Institut25 Jahre HPI
Hasso-Plattner-Institut25 Jahre HPI

Penetration Testing and Securing IPv6 Networks (Sommersemester 2013)

Dozent: Prof. Dr. Christoph Meinel (Internet-Technologien und -Systeme)

Allgemeine Information

  • Semesterwochenstunden: 4
  • ECTS: 6
  • Benotet: Ja
  • Einschreibefrist: 10.2.2013 - 30.4.2013
  • Lehrform: SP
  • Belegungsart: Wahlpflichtmodul

Studiengänge, Modulgruppen & Module

IT-Systems Engineering BA
IT-Systems Engineering MA
  • IT-Systems Engineering A
  • IT-Systems Engineering B
  • IT-Systems Engineering C
  • IT-Systems Engineering D


Last update 11.04.2013

Security has recently become a very important concern in the use of IPv6 networks. Companies and industries are reluctant to move to (utilize) IPv6 networking because they are unsure about the security afforded them when using this new protocol. They want to be assured that the level of security will be at least the same or hopefully even higher than that given them with their use of IPv4. Of course the main force driving the use of IPv6 vice IPv4 is the lack of available new addresses in IPv4. This is a great motivating factor and companies like Google are offering services in both IPv4 and IPv6. This having been said, there still remains a fear among vendors concerning weaknesses inherent in IPv6 which prevent them from using this protocol

We at HPI, since the start of the year, have created an IPv6 Security Solution Lab (IPv6SSL) where we intend to do penetration testing against all the services in the application layer and network layer of IPv6 networks and to offer a minimum standard that a network should maintain in order to have secure operations using the IPv6 protocol. We are currently at the stage in the lab where we are devising and implementing attacks against an IPv6 network.

The purpose of this seminar is to teach students how to provide security protection in IPv6 networks by finding the security flaws that are inherent with this network..

Important: Our intent is not to teach you how to attack systems but how to protect systems from attacks!


There are many security issues that are of concern in the use of IPv6 networks and we are going to test them. To do this the seminar is divided into two phases. In the first phase you will need to find ways of detecting the current services available in this network and then implement additional attacks against them, attacks that do not currently exist in the lab. For the second phase you will prepare reports defining what types of attacks you used and whether or not they were effective. This will be done by implementing a service to check the status of the network after such attacks were perpetrated. Students will therefore be divided into 2 or 3 groups. Detailed information will be disseminated and explained in the first session.

Important Dates:
09.04.13: Introductory session - Done!
10.04.13: I will be here to answer any questions that might come to your mind
17.04.13: I will explain the seminar topics in more detail.
    Deadline to express your interest by sending me an email to rafiee(at)hpi.uni-potsdam.de (subject line: IPv6SSL seminar)
The seminar has limited number of participants <= 10 students
24.04.13:  Official Registration with Frau Pamperin.  Topic Introduction: Team building, initial materials and references   
~15.06.13    First Phase:
            Implementation and Presentation (integrate your work into the lab)
~15.07.13    Second Phase:
         Implementation and Presentation (integrate your work into the lab)
~30.07.13     Second Phase:
You will need to present the results of your work after finishing each phase.


Seminar Topics

Application layer attacks (in both wireless and wired networks)

  • Attacks against DNS
    • IP spoofing
      • DNS update
      • DNS resolving
    • Cache poisoning,…  DNS amplification, etc.
    • Reflector
  • Attacks against mail servers (Sending spam from different IP addresses)

Network layer attacks (in  both wireless and wired networks)

  •  Attacks against Secure Neighbor Discovery
  • Message Spoofing
  • CGA
  • Attacks against Tunneling
  • Tracking a node by it‘s IP address (privacy attack)
  • Attacks against double stack networks (both IPv4 and IPv6)
  • A topic proposed by you

What do you need to do if you would like to attend this seminar?

  1. Select your team member(s)
  2. Select two topics
  3. Think about these topics and choose one of them
  4. Send me an email, include your name, your team member(CC his email(s)), your selected topic and one short paragraph about what do you think about this topic and what do you expect to learn...
    If you do not know what topic you want to choose, but you want to attend the seminar and you have chosen your team member(s) then just send me an email stating this and i will get back to you.

    if you do know what topic you want to choose but you do not have any team members, send me an email expressing your idea about your selected topic and I will check to see whether or not any other students chose this topic and then merge you into the same team.

  5. I will send you a confirmation message
  6. Officially register with Frau Pamperin for the seminar

Guidelines to select a topic

  • Ask yourself these questions
  1. What protocol do I want to evaluate? DNS, SeND,IPsec, VoIP,Mobile IPv6, etc.
  2. What attacks do I want to implement? spoofing, DoS, etc. (You need to implement 1 to 2 attacks against the protocol you have chosen which will depend on the time required to implement the first attack)
  3. What do I need to know about this protocol? Are there any lectures available with information concerning my topic? If you want help with this, ask me.

If you have further questions that I did not cover here, simply send me an email or come by my office at room H.1.17.


A few requirements are as follow. The detailed list will be explained at the introductory session:
● The language used in the lab will be C++ in a mostly Linux environment
● You should have general information about network and network security
● You should know about mysql server database
● ...

Lern- und Lehrformen

- Some sample code used for attacking

- Other resources can be downloaded from here file://///fs3/lehrveranstaltungen/Seminar_Penetration_Testing_and_Securing IPv6networks_SS2013


The evaluation and final grade is based on the quality of the report, the presentation and the implementations and the sum of your total activities


-       Implementations      40%

-       Presentation            25%

-       Report                     35%

What each group needs to deliver to me

Phase I:
- Report (up to 15 pages, Springer LNCS style)
  Explain : Problems you encountered, research you did, and the solutions you chose and why?
- Presentation (up to 25 mins)
Demonstration of your work
Phase II:
- Final Report (up to 20 pages, Springer LNCS Style)
  Explain: design, implementation, documented code, and discussions
- Presentation (up to 20 mins)
 Demonstration of running system
  Explanation of any problems you encountered 

Finally you need to send me your reports, code, and  presentation slides


- Introductory sessions will be on 9.04.2013 - Done!

- Note: On 10.04.2013 (FAQ session) - It will be in room H-2.58 - Done!

Dienstag, 17:00-18:30

Mittwoch, 13:30-15:00

Place: H-E.52