ERNW at NinjaCon (fka PlumberCon)
Yesterday we made our way to Vienna to participate and contribute to NinjaCon (formerly known as PlumberCon, before Nintendo Inc. claimed their rights ). After our arrival Oliver held a five hour...
View ArticleSell Your Own Device – A Field Study on Decommissioning of Mobile Devices
On Friday we released our latest technical newsletter with the fancy title “Sell Your Own Device – A Field Study on Decommissioning of Mobile Devices”. It is the result of a field study on...
View ArticleHackito Ergo Sum 2014
Greetings from Heidelberg to Paris, and thanks for a great time at HES14! A nice venue (a museum), sweet talks and stacks of spirit carried us through the three day con. It all set off with a keynote...
View ArticleTroopers PacketWars 2015 – Write Up
Hello Hackers! This year’s PacketWars contest at Troopers was a blast! Under the topic of “Connected Car” the teams faced several different challenges, which we will describe (as a debriefing)...
View Article#TR16 IPv6 Security Summit Teaser: Building a Reliable and Secure IPv6 WiFi...
Hi everyone, some of you may have seen my last blog post about the preparation of the Troopers network. Today I want to give you a little teaser on what to expect for the talk I will present during the...
View Article#TR16 IPv6 Security Summit Teaser: First-Hop-Security on HP Network Devices
Hello Everybody, Today I want to give you a little teaser about my upcoming talk at the IPv6 Security Summit about First-Hop-Security on HP devices. In the past I presented on about First-Hop-Security...
View ArticleMultiple Address Family OSPFv3
Dear Readers, today I want to talk about OSPFv3. I won’t cover the glory details of OSPFv3, there are smarter guys than me out there who did that already 😉 and there are great resources to familiarize...
View Article#TR16 IPv6 Security Summit Teaser: Basic IPv6 Attacks & Defenses Workshop
Dear Readers, It’s me again with another teaser for an upcoming workshop at the IPv6 Security Summit. This one is a classic! If you happen to deploy IPv6 in your environment in the near future, but...
View ArticleMulticast Based IPv6 Neighbor Spoofing / Response Behavior on Cisco Devices
Dear readers, today we want to examine the behavior of Cisco devices when they receive spoofed IPv6 Neighbor Advertisement packets from an untrusted system pretending to be the default router for the...
View ArticleReflections on the IPv6-only WiFi Experience during Troopers
Hello, Troopers is (unfortunately) over. It was a blast (but I may be biased ;-))! After things have settled, I want to take the opportunity to reflect my thoughts and impressions on the IPv6-only WiFi...
View ArticleCVE-2016-1409 – IPv6 NDP DoS Vulnerability in Cisco Software
Dear readers, As you may have already noticed, Cisco released an urgent security advisory describing an IPv6 Neighbor Discovery DoS Vulnerability in several flavors of Cisco’s operating systems....
View ArticleWelcome to Insinuator.net 2.0
It’s almost exactly seven years since Enno published the very first blog post on Insinuator.net. Meanwhile, quite a few things changed. It’s not only the ERNW Universe which grew significantly, but...
View Article
More Pages to Explore .....