Blog Posts Tagged with "DNS"

Default-avatar

Resource: Defeating Advanced Persistent Threat Malware

January 29, 2013 Added by:Infosec Island

Attacks can come from anywhere. Even more daunting is that not all malware is alike. Learn about battling advanced threats and the progressive strategies to battle malware from this new white paper.

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

Can DNS Attacks Threaten the Internet on a Large Scale?

March 27, 2012 Added by:Alan Woodward

This attack is theoretically possible because the DNS is a hierarchy. At the top level are 13 servers. Disrupt them and you could disrupt the entire DNS network. Authorities know this and they put a lot of effort into ensuring that the DNS network can cope with a DOS attack...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Planned Anonymous Attack on the Internet Likely to Fail

February 20, 2012 Added by:Headlines

"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

FBI Claims Biggest Cybercrime Takedown in History

November 10, 2011 Added by:Headlines

"The malware secretly altered the settings on infected computers enabling the defendants to digitally hijack Internet searches and re-route computers to certain websites and advertisements, which entitled the defendants to be paid. The defendants subsequently received fees each time..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CERT Malaysia Releases DNSwatch Tool

August 30, 2011 Added by:Headlines

"DNSwatch will help you avoid known bad websites or sites that will trick your computer into downloading and installing malicious programs on your computer. Even better, DNSwatch will also prevent you from accessing malicious websites that you may not even know your computer is trying to access..."

Comments  (0)

3ebd200287a032cf6d13d6b75a570c94

Quiet Please - H4xing in Progress

August 10, 2011 Added by:David Martinez

I used this script from the BT5 How-To page, which grabs packets, redirects them through sslstrip, prints the info to my machine, and sends it to the end-user with a spoofed source. Within 30 minutes, I had at least 5 different passwords for FB, Twitter, G-mail, and others...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Interesting DNS Stuff - SRV Records

March 26, 2011 Added by:Rob Fuller

The following are good adds to your DNS brute force list. These are all SRV records so make sure your type is set correctly. SRV records tell you the port in the answer. I don't know of any DNS tools that utilize SRV as part of their process, but scripting dig to do so isn't tough...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Google Adds Authentication to Google Apps

February 04, 2011 Added by:Bill Gerneglia

By implementing DomainKeys Identified Mail (DKIM) at no additional cost to Google Apps users, the company says it is giving email senders a way to validate who they are in a manner that spam filters recognize, therefore ensuring higher message delivery rates to recipients...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The U.S. Already Has An Internet Kill Switch

February 04, 2011 Added by:Headlines

The U.S government already has the ability to control Internet access. The debate over legislating an "Internet Kill Switch" is not one of whether to create a mechanism to control Internet access, but one of who will legally exercise the power to limit accessibility and under what circumstances...

Comments  (0)

76814d6a11ad20c1c48be0e9dce501a7

Are We IPv6 Ready? No, We Are Not

January 24, 2011 Added by:Antonio Ierano

IPv6 brings some caveats as a new addressing space that needs to be understood and correctly implemented: a lack of IPv6 services ready to be used (think the DNS name space resolution as an example); and most of all, a TCP\IP network infrastructure that is not IPv6 compliant at the moment...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Project Honeypot HTTP Blocklist Module

December 29, 2010 Added by:Rob Fuller

Project Honeypot does an amazing job at keeping detailed information on scanners / harvesters and brute forcers, the likes of which are the daily enemy of said admins. They offer a service called HTTP Block List or 'HTTP:BL'...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Loses Their Domain Names

December 03, 2010 Added by:Headlines

WikiLeaks lost the domain names Wikileaks.org and Cablegate.org, limiting access to the whistleblower website using the alphabetical web addresses. Amazon announced Wednesday they would no longer host the websites, but denies that it was because of pressure applied by Senator Joe Lieberman...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Understanding the Domain Name System

November 29, 2010 Added by:Global Knowledge

The DNS takes advantage of the context-based memory clues that names provide and translates those names into IP addresses. Network managers can also take advantage of this name to address mapping to control traffic to various servers in their networks...

Comments  (1)

98180f2c2934cab169b73cb01b6d7587

Domain Name System and Cyber Security Vulnerability

October 11, 2010 Added by:Jon Stout

The original design of the Domain Name System did not include robust security features; it was designed to be a scalable and open distributed system with backwards compatibility, and attempts to add security were rudimentary and did not keep pace with malicious hackers...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

How To Test for DNS Compatibility

July 16, 2010 Added by:Simon Heron

L.ROOT-SERVERS.NET was the first to switch to a signed copy of the root zone and can be used for testing. This version has been configured deliberately so that it cannot be validated. Its purpose is to allow operators to test whether they can receive signed responses cleanly...

Comments  (0)