Deprecation of type 0 routing headers in IPv6, p.5095, 2007. ,
DOI : 10.17487/rfc5095
Attacking ipv6 implementation using fragmentation, 2012. ,
Breaking dnssec, 2009. ,
IPv6 routing header security, 2007. ,
RFC 5157: IPv6 implications for network scanning, 2008. ,
DOI : 10.17487/rfc5157
IPv6 transition/coexistence security considerations, p.4942, 2007. ,
DOI : 10.17487/rfc4942
Finding v6 hosts by efficiently mapping ip6.arpa, p.6, 2012. ,
Results of a security assessment of the internet protocol version 6, 2011. ,
Security implications of ipv6 on ipv4 networks, 2012. ,
DOI : 10.17487/rfc7123
Security and interoperability implications of oversized ipv6 header chains, 2012. ,
DOI : 10.17487/rfc7112
The Open Source Security Testing Methodology Manual, ISECOM, 2010. ,
Recent advances in IPv6 insecurities, 2010. ,
Vulnerabilities, failures -and a future, 2011. ,
RFC 4291: IP version 6 addressing architecture, p.4291, 2006. ,
DOI : 10.17487/rfc4291
Active BGP entries (FIB) ,
Ipv6: Privacy extensions einschalten. http://www.heise.de/netze/ artikel/IPv6-Privacy-Extensions-einschalten-1204783.html, 2011. ,
RFC 5722 -Handling of overlapping IPv6 fragments, p.5722, 2009. ,
DOI : 10.17487/rfc5722
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.589.6074
RFC 5155: DNS security (DNSSEC) hashed authenticated denial of existence, p.5155, 2008. ,
DOI : 10.17487/rfc5155
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.6050
Observations of IPv6 Addresses, PAM'08 Proceedings of the 9th international conference on Passive and active network measurement, 2008. ,
DOI : 10.1007/978-3-540-79232-1_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.3896
Tiny fragments in ipv6. http://tools.ietf.org/html/draft-manral-6man-tiny-fragments-issues-00, 2012. ,
RFC 4941: Privacy extensions for stateless address autoconfiguration in IPv6, p.4941, 2007. ,
DOI : 10.17487/rfc3041
RFC 6177 -IPv6 address assignments to end sites, p.6177, 2011. ,
DOI : 10.17487/rfc6177
Penetration testing ? a systematic approach, Tech. rep., infosecwriters.com, 2006. ,
Technical guide to information security testing and assessment, Tech. rep., NIST, 2008. ,
DOI : 10.6028/NIST.SP.800-115
Conducting a penetration test on an organization, 2002. ,
RFC 1858 -security considerations for IP fragment filtering, 1995. ,
DOI : 10.17487/rfc1858