Blog Posts Tagged with "DNS"
January 29, 2013 Added by:Infosec Island
Attacks can come from anywhere. Even more daunting is that not all malware is alike. Learn about battling advanced threats and the progressive strategies to battle malware from this new white paper.
March 27, 2012 Added by:Alan Woodward
This attack is theoretically possible because the DNS is a hierarchy. At the top level are 13 servers. Disrupt them and you could disrupt the entire DNS network. Authorities know this and they put a lot of effort into ensuring that the DNS network can cope with a DOS attack...
February 20, 2012 Added by:Headlines
"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."
November 10, 2011 Added by:Headlines
"The malware secretly altered the settings on infected computers enabling the defendants to digitally hijack Internet searches and re-route computers to certain websites and advertisements, which entitled the defendants to be paid. The defendants subsequently received fees each time..."
August 30, 2011 Added by:Headlines
"DNSwatch will help you avoid known bad websites or sites that will trick your computer into downloading and installing malicious programs on your computer. Even better, DNSwatch will also prevent you from accessing malicious websites that you may not even know your computer is trying to access..."
August 10, 2011 Added by:David Martinez
I used this script from the BT5 How-To page, which grabs packets, redirects them through sslstrip, prints the info to my machine, and sends it to the end-user with a spoofed source. Within 30 minutes, I had at least 5 different passwords for FB, Twitter, G-mail, and others...
March 26, 2011 Added by:Rob Fuller
The following are good adds to your DNS brute force list. These are all SRV records so make sure your type is set correctly. SRV records tell you the port in the answer. I don't know of any DNS tools that utilize SRV as part of their process, but scripting dig to do so isn't tough...
February 04, 2011 Added by:Bill Gerneglia
By implementing DomainKeys Identified Mail (DKIM) at no additional cost to Google Apps users, the company says it is giving email senders a way to validate who they are in a manner that spam filters recognize, therefore ensuring higher message delivery rates to recipients...
February 04, 2011 Added by:Headlines
The U.S government already has the ability to control Internet access. The debate over legislating an "Internet Kill Switch" is not one of whether to create a mechanism to control Internet access, but one of who will legally exercise the power to limit accessibility and under what circumstances...
January 24, 2011 Added by:Antonio Ierano
IPv6 brings some caveats as a new addressing space that needs to be understood and correctly implemented: a lack of IPv6 services ready to be used (think the DNS name space resolution as an example); and most of all, a TCP\IP network infrastructure that is not IPv6 compliant at the moment...
December 29, 2010 Added by:Rob Fuller
Project Honeypot does an amazing job at keeping detailed information on scanners / harvesters and brute forcers, the likes of which are the daily enemy of said admins. They offer a service called HTTP Block List or 'HTTP:BL'...
December 03, 2010 Added by:Headlines
WikiLeaks lost the domain names Wikileaks.org and Cablegate.org, limiting access to the whistleblower website using the alphabetical web addresses. Amazon announced Wednesday they would no longer host the websites, but denies that it was because of pressure applied by Senator Joe Lieberman...
November 29, 2010 Added by:Global Knowledge
The DNS takes advantage of the context-based memory clues that names provide and translates those names into IP addresses. Network managers can also take advantage of this name to address mapping to control traffic to various servers in their networks...
October 11, 2010 Added by:Jon Stout
The original design of the Domain Name System did not include robust security features; it was designed to be a scalable and open distributed system with backwards compatibility, and attempts to add security were rudimentary and did not keep pace with malicious hackers...
July 16, 2010 Added by:Simon Heron
L.ROOT-SERVERS.NET was the first to switch to a signed copy of the root zone and can be used for testing. This version has been configured deliberately so that it cannot be validated. Its purpose is to allow operators to test whether they can receive signed responses cleanly...
Mass Disclosure of Vulnerabilities in SAP... john niko on 12-09-2013
Join Trend Micro & SecurityWeek in Belle... Shah Alam on 12-06-2013
Looking Beyond "Black Box Testing"... Paul Reed on 12-03-2013