sábado, 27 de janeiro de 2024

DNSSEC, From An End-User Perspective, Part 3

In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases?

The following list are the attack types from the first post, where DNSSEC can protect the users:

  • DNS cache poisoning the DNS server, "Da Old way"
  • DNS cache poisoning, "Da Kaminsky way"
  • ISP hijack, for advertisement or spying purposes
  • Captive portals
  • Pentester hijacks DNS to test application via active man-in-the-middle
  • Malicious attacker hijacks DNS via active MITM

The following list are the attack types from the first post, where DNSSEC cannot protect the users:

  • Rogue DNS server set via malware
  • Having access to the DNS admin panel and rewriting the IP
  • ISP hijack, for advertisement or spying purposes
  • Captive portals
  • Pentester hijacks DNS to test application via active man-in-the-middle
  • Malicious attacker hijacks DNS via active MITM

If you are a reader who thinks while reading, you might say "What the hell? Am I protected or not???". The problem is that it depends… In the case where the attacker is between you and your DNS server, the attacker can impersonate the DNS server, downgrade it to a non DNSSEC aware one, and send responses without DNSSEC information.

Now, how can I protect against all of these attacks? Answer is "simple":
  1. Configure your own DNSSEC aware server on your localhost, and use that as a resolver. This is pretty easy, even I was able to do it using tutorials.
  2. Don't let malware run on your system! ;-)
  3. Use at least two-factor authentication for admin access of your DNS admin panel.
  4. Use a registry lock (details in part 1).
  5. Use a DNSSEC aware OS.
  6. Use DNSSEC protected websites.
  7. There is a need for an API or something, where the client can enforce DNSSEC protected answers. In case the answer is not protected with DNSSEC, the connection can not be established.

Now some random facts, thoughts, solutions around DNSSEC:

That's all folks, happy DNSSEC configuring ;-)

Note from David:
Huh, I have just accidentally deleted this whole post from Z, but then I got it back from my browsing cache. Big up to Nir Sofer for his ChromeCacheView tool! Saved my ass from kickin'! :D

Related articles


  1. Hacker Techniques Tools And Incident Handling
  2. Hacker Tools Linux
  3. Hacker Tools Free Download
  4. Hack Tools Online
  5. Hacking Tools
  6. Hack Rom Tools
  7. Nsa Hacker Tools
  8. Hacker
  9. Hack Tools For Mac
  10. Hack Tools
  11. Top Pentest Tools
  12. Hacker Tools For Pc
  13. Hacker Tools Apk Download
  14. Hacker Hardware Tools
  15. Hacking Tools Windows 10
  16. Hacker Tools Mac
  17. Hacker Tools Apk Download
  18. Hacker Search Tools
  19. Tools 4 Hack
  20. Pentest Tools Subdomain
  21. Pentest Tools Review
  22. Free Pentest Tools For Windows
  23. Pentest Tools Open Source
  24. Ethical Hacker Tools
  25. Bluetooth Hacking Tools Kali
  26. Pentest Tools Website
  27. Tools For Hacker
  28. Hacking Tools For Mac
  29. Computer Hacker
  30. Hack Tools Mac
  31. Hacking Tools For Kali Linux
  32. Hacking Tools Github
  33. Best Pentesting Tools 2018
  34. How To Install Pentest Tools In Ubuntu
  35. Hacker Techniques Tools And Incident Handling
  36. Hacks And Tools
  37. Hak5 Tools
  38. Best Pentesting Tools 2018
  39. Hacking Tools Online
  40. Hack And Tools
  41. Pentest Tools Port Scanner
  42. Hack Tools Download
  43. Pentest Tools List
  44. Hacker Tools Github
  45. Hacking Tools Download
  46. Pentest Tools Online
  47. Android Hack Tools Github
  48. Hack Apps
  49. Computer Hacker
  50. Hacker Tools Free Download
  51. Hacking Tools Download
  52. Hack Tools
  53. Hacker Tools Online
  54. Pentest Tools Port Scanner
  55. Hacking Tools Software
  56. Hacking Tools For Windows
  57. Hacker Tools Free
  58. Hacker
  59. How To Make Hacking Tools
  60. Hack Tools
  61. Underground Hacker Sites
  62. What Is Hacking Tools
  63. Hacking Tools For Windows Free Download
  64. How To Install Pentest Tools In Ubuntu
  65. Nsa Hacker Tools
  66. Hackers Toolbox
  67. Usb Pentest Tools
  68. Hacker Tools 2019
  69. Hacking Tools For Mac
  70. Hacker Tools Hardware
  71. Pentest Tools Bluekeep
  72. Kik Hack Tools
  73. Hacking Tools Free Download
  74. Hacking Tools For Games
  75. Hacking Tools Download
  76. Hacker Security Tools
  77. Pentest Tools Windows
  78. Pentest Tools Open Source
  79. Hacking Tools Hardware
  80. Best Hacking Tools 2020
  81. Hacker Tools Free
  82. How To Hack
  83. Hacking Tools Usb
  84. Hackrf Tools
  85. Hacking Tools Free Download
  86. Hacker Tools Apk Download
  87. Hacking Tools Windows
  88. Pentest Tools Kali Linux
  89. Hacking Tools Pc
  90. Hacking Tools Download
  91. Tools Used For Hacking
  92. Hacking Tools For Pc
  93. Hacking Tools Usb
  94. Hack Tools
  95. World No 1 Hacker Software
  96. Ethical Hacker Tools
  97. Hacking Tools Name
  98. Hacker Tools Linux
  99. Android Hack Tools Github
  100. Hacker Tools Free Download
  101. Hacking Tools For Kali Linux
  102. Hacker Tools
  103. Kik Hack Tools
  104. Best Pentesting Tools 2018
  105. Hacking Tools For Windows 7
  106. Pentest Tools Website
  107. Hack Tool Apk
  108. Underground Hacker Sites
  109. Hacking Tools For Windows 7
  110. Hack Tools Github
  111. Ethical Hacker Tools
  112. Hacker Tools Free Download
  113. Hacking Tools Software
  114. Android Hack Tools Github
  115. Hack Tool Apk
  116. Pentest Tools Nmap
  117. How To Hack
  118. Underground Hacker Sites
  119. Hacker Tools Windows
  120. Hack Tools Github
  121. Hacker Techniques Tools And Incident Handling
  122. Hacker Security Tools
  123. Pentest Tools Linux
  124. Pentest Tools For Android
  125. Hack Tools For Windows
  126. Pentest Tools Download
  127. Hacker Tools For Windows
  128. Bluetooth Hacking Tools Kali
  129. Pentest Tools Url Fuzzer
  130. Hacker Tools Free
  131. Pentest Tools Subdomain
  132. Pentest Tools Framework
  133. Hacker Tools
  134. Hacker Tools Windows
  135. Hacker Tools Apk Download
  136. Hacking Tools Windows
  137. Free Pentest Tools For Windows
  138. Hacking Tools 2019
  139. Hak5 Tools
  140. Hacking Tools Free Download
  141. Pentest Tools Windows
  142. Hack Tool Apk No Root
  143. Pentest Reporting Tools
  144. Hacker Tools Windows
  145. Tools For Hacker
  146. Free Pentest Tools For Windows
  147. Hacker Tools Free Download
  148. Hack Tools For Games
  149. Hackrf Tools
  150. Hacking Tools 2019
  151. Hacking Tools For Beginners
  152. Hack Tools For Games
  153. Pentest Tools Url Fuzzer

TERMINOLOGIES OF ETHICAL HACKING

What is the terminologies in ethical hacking?

Here are a few key terms that you will hear in discussion about hackers and what they do:


1-Backdoor-A secret pathway a hacker uses to gain entry to a computer system.


2-Adware-It is the softw-are designed to force pre-chosen ads to display on your system.


3-Attack-That action performs by a attacker on a system to gain unauthorized access.


4-Buffer Overflow-It is the process of attack where the hacker delivers malicious commands to a system by overrunning an application buffer.


5-Denial-of-Service attack (DOS)-A attack designed to cripple the victim's system by preventing it from handling its normal traffic,usally by flooding it with false traffic.


6-Email Warm-A virus-laden script or mini-program sent to an unsuspecting victim through a normal-looking email message.


7-Bruteforce Attack-It is an automated and simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords,again & again until it gets in from bruteforce dictionary.


8-Root Access-The highest level of access to a computer system,which can give them complete control over the system.


9-Root Kit-A set of tools used by an intruder to expand and disguise his control of the system.It is the stealthy type of software used for gain access to a computer system.


10-Session Hijacking- When a hacker is able to insert malicious data packets right into an actual data transmission over the internet connection.


11-Phreaker-Phreakers are considered the original computer hackers who break into the telephone network illegally, typically to make free longdistance phone calls or to tap lines.


12-Trojan Horse-It is a malicious program that tricks the computer user into opening it.There designed with an intention to destroy files,alter information,steal password or other information.


13-Virus-It is piece of code or malicious program which is capable of copying itself has a detrimental effect such as corrupting the system od destroying data. Antivirus is used to protect the system from viruses.


14-Worms-It is a self reflicating virus that does not alter  files but resides in the active memory and duplicate itself.


15-Vulnerability-It is a weakness which allows a hacker to compromise the security of a computer or network system to gain unauthorized access.


16-Threat-A threat is a possible danger that can exploit an existing bug or vulnerability to comprise the security of a computer or network system. Threat is of two types-physical & non physical.


17-Cross-site Scripting-(XSS) It is a type of computer security vulnerability found in web application.It enables attacker to inject client side script into web pages viwed by other users.


18-Botnet-It is also known as Zombie Army is a group of computers controlled without their owner's knowledge.It is used to send spam or make denial of service attacks.


19-Bot- A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a period than a human operator could do it.Example-Sending HTTP, FTP oe Telnet at a higer rate or calling script to creat objects at a higher rate.


20-Firewall-It is a designed to keep unwanted intruder outside a computer system or network for safe communication b/w system and users on the inside of the firewall.


21-Spam-A spam is unsolicited email or junk email sent to a large numbers of receipients without their consent.


22-Zombie Drone-It is defined as a hi-jacked computer that is being used anonymously as a soldier or drone for malicious activity.ExDistributing Unwanted Spam Emails.


23-Logic Bomb-It is a type of virus upload in to a system that triggers a malicious action when certain conditions are met.The most common version is Time Bomb.


24-Shrink Wrap code-The process of attack for exploiting the holes in unpatched or poorly configured software.


25-Malware-It is an umbrella term used to refer a variety of intrusive software, including computer viruses,worms,Trojan Horses,Ransomeware,spyware,adware, scareware and other malicious program.


Follow me on instagram-anoymous_adi

Related posts

Nemesis: A Packet Injection Utility


"Nemesis is a command-line network packet injection utility for UNIX-like and Windows systems. You might think of it as an EZ-bake packet oven or a manually controlled IP stack. With Nemesis, it is possible to generate and transmit packets from the command line or from within a shell script. Nemesis attacks directed through fragrouter could be a most powerful combination for the system auditor to find security problems that could then be reported to the vendor(s)." read more...

Website: http://www.packetfactory.net/projects/nemesis

Related word
  1. Pentest Tools Subdomain
  2. Pentest Tools For Android
  3. Pentest Tools Nmap
  4. Pentest Tools Download
  5. Black Hat Hacker Tools
  6. Nsa Hack Tools Download
  7. Best Pentesting Tools 2018
  8. Pentest Tools Download
  9. Pentest Box Tools Download
  10. Beginner Hacker Tools
  11. Hacker Tools Hardware
  12. Pentest Tools For Mac
  13. How To Make Hacking Tools
  14. Underground Hacker Sites
  15. Install Pentest Tools Ubuntu
  16. Hack Tools
  17. Pentest Tools Website
  18. Hacking Tools For Games
  19. Pentest Tools Bluekeep
  20. Pentest Tools Github
  21. Hacking Tools For Windows
  22. Pentest Automation Tools
  23. Hacker Tool Kit
  24. Hacker Search Tools
  25. Pentest Tools For Mac
  26. Hacker Tools Hardware
  27. Hacking Tools 2020
  28. Pentest Tools Android
  29. How To Install Pentest Tools In Ubuntu
  30. Pentest Tools For Mac
  31. Pentest Tools Alternative
  32. Pentest Tools Kali Linux
  33. Tools Used For Hacking
  34. Pentest Tools Windows
  35. Hack Tools Online
  36. Hacking Tools For Games
  37. How To Make Hacking Tools
  38. Hack Tools
  39. Hack Tools
  40. Top Pentest Tools
  41. Pentest Tools Alternative
  42. Hacker
  43. Hacker Tools Linux
  44. Pentest Tools
  45. Hack Tools For Games
  46. What Is Hacking Tools
  47. Hacking Tools Software
  48. Hacking Tools Github
  49. Hacker Tools Mac
  50. Pentest Tools Website Vulnerability
  51. Hack Tools Github
  52. Hack Tools For Mac
  53. Nsa Hack Tools
  54. Install Pentest Tools Ubuntu
  55. Hacker Hardware Tools
  56. Kik Hack Tools
  57. Pentest Tools For Ubuntu
  58. Hack Tools Mac
  59. Black Hat Hacker Tools
  60. Hacker Tools List
  61. Hack Tools Download
  62. Hack Tools For Ubuntu
  63. Hacker Tools For Mac
  64. Hack And Tools
  65. Pentest Tools Website
  66. Hacking Apps
  67. Hack Rom Tools
  68. Pentest Tools Alternative
  69. Hacker Tools For Ios
  70. Hacking App
  71. Hack Tools
  72. Pentest Tools Find Subdomains
  73. Hacking Tools Name
  74. Hacking Tools Windows
  75. Pentest Tools For Ubuntu
  76. What Is Hacking Tools
  77. Hackrf Tools
  78. How To Install Pentest Tools In Ubuntu
  79. Pentest Tools Download
  80. Hacking Tools Hardware
  81. Hacking Tools For Beginners
  82. Hacking Tools Mac
  83. Hacker Security Tools
  84. Black Hat Hacker Tools
  85. Pentest Reporting Tools
  86. Hacking Apps