----[ IPv6 overview: http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd8054d37d.html http://www.zytrax.com/tech/protocols/ipv6.html <<-- intro to data types, opt headers, addresses http://www.freebsd.org/doc/en/books/developers-handbook/ipv6.html (BSD configs) http://www.montefiore.ulg.ac.be/~leduc/cours/ISIR/ipv6_sec.pdf <<-- condensed overview of IPv6 issues, attacks. https://sites.google.com/site/yartikhiy/home/ipv6book <<-- Great & in-depth explanations of the "why" and "how". Read: Ch 2, Ch 3 (less 3.3.5), Ch 4.3, Ch 5.1 ----[ IPv6 neighbor discovery: http://njetwork.wordpress.com/2014/01/07/ipv6-nd-state-machine/ (based on http://tools.ietf.org/html/rfc4861#page-89) (THC tools below exploit some of these states) ----[ Security/vulnerabilities: https://www.thc.org/thc-ipv6/ <<-- THC attack tool suite https://www.thc.org/papers/vh_thc-ipv6_attack.pdf <--- presentation http://pacsec.jp/psj05/psj05-vanhauser-en.pdf <--- possibly more readable slides version ------[ Code review reports: http://clem1.be/gimme/ipv6sec.pdf <--- 2006 Summer of code vulns in KAME & USAGI ------[ ICMPv6 fragmentation vulnerability: http://www.defcon.org/images/defcon-15/dc15-presentations/Ortega/Whitepaper/dc-15-ortega-WP.pdf <---- Core 2007 exploit whitepaper explaining the overflow pp.1-6 ip6_input -> hbh -> IP6_EXTHDR_GET -> m_pulldown -> m_dup1 ip6_hopopts_input ip6_process_hopopts http://www.tcpipguide.com/free/t_IPv6DatagramSizeMaximumTransmissionUnitMTUFragment-4.htm <--- Fragmentation & reassembly