Podcasts about teredo

  • 3PODCASTS
  • 3EPISODES
  • 1h 5mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 9, 2018LATEST

POPULARITY

20172018201920202021202220232024


Latest podcast episodes about teredo

Grunt Free Press Podcast
Grunt Free Press Podcast Episode 169

Grunt Free Press Podcast

Play Episode Listen Later Oct 9, 2018 86:15


Spooky Spook Fest with a g-g-g-girl survival horror protagonist. It's the usual rambling, half-remembered gaming history and stories no one cares about, just spookier. Topics - The Terrible Tale of Teredo, command prompts, Forza Horizon 4, IPv6, legacy products, Silent Hill 3 and some series history, regretting eBay impulse purchases, nonsensical family tree and British accents, exploration is a death sentence, Achtung! Cthulhu Tactics, The Seventh Guest. Music - Necro - White Slavery, Rob Zombie - Pussy Liquor, Blue Oyster Cult - (Don't Fear) The Reaper

Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
Jim Hoagland: Vista Network Attack Surface Analysis and Teredo Security Implications

Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.

Play Episode Listen Later Jan 9, 2006 54:59


This talk will present the results of a broad analysis performed on the network-facing components of the release (RTM) version of Microsoft Windows Vista, as well as the results of study of the security implications of the related Teredo protocol. Windows Vista features a rewritten network stack, which introduces a number of core behavior changes. New protocols include IPv6 and related protocols, LLTD, LLMNR, SMB2, PNRP, PNM, and WSD. One of the IPv4-IPv6 transition mechanisms provided by Vista is Teredo, which tunnels IPv6 through a NAT by using IPv4 UDP. This provides globally usable IPv6 addresses without the knowledge or cooperation of any part of local network. The main security concerns raised by Teredo involves security controls being bypassed, defense in depth reduced, and unsolicited traffic being allowed by the protocol. Other security concerns with Teredo include the capability of remote nodes to open the NAT for themselves, worms, ways to deny Teredo service, the difficulty in finding all Teredo traffic to inspect, and a new phishing mechanism.

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
Jim Hoagland: Vista Network Attack Surface Analysis and Teredo Security Implications

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.

Play Episode Listen Later Jan 9, 2006 54:59


This talk will present the results of a broad analysis performed on the network-facing components of the release (RTM) version of Microsoft Windows Vista, as well as the results of study of the security implications of the related Teredo protocol. Windows Vista features a rewritten network stack, which introduces a number of core behavior changes. New protocols include IPv6 and related protocols, LLTD, LLMNR, SMB2, PNRP, PNM, and WSD. One of the IPv4-IPv6 transition mechanisms provided by Vista is Teredo, which tunnels IPv6 through a NAT by using IPv4 UDP. This provides globally usable IPv6 addresses without the knowledge or cooperation of any part of local network. The main security concerns raised by Teredo involves security controls being bypassed, defense in depth reduced, and unsolicited traffic being allowed by the protocol. Other security concerns with Teredo include the capability of remote nodes to open the NAT for themselves, worms, ways to deny Teredo service, the difficulty in finding all Teredo traffic to inspect, and a new phishing mechanism.