Blog Posts Tagged with "DNS"


Resource: Defeating Advanced Persistent Threat Malware

January 29, 2013 Added by:Infosec Island

Attacks can come from anywhere. Even more daunting is that not all malware is alike. Learn about battling advanced threats and the progressive strategies to battle malware from this new white paper.

Comments  (0)


Can DNS Attacks Threaten the Internet on a Large Scale?

March 27, 2012 Added by:Alan Woodward

This attack is theoretically possible because the DNS is a hierarchy. At the top level are 13 servers. Disrupt them and you could disrupt the entire DNS network. Authorities know this and they put a lot of effort into ensuring that the DNS network can cope with a DOS attack...

Comments  (3)


Planned Anonymous Attack on the Internet Likely to Fail

February 20, 2012 Added by:Headlines

"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."

Comments  (1)


FBI Claims Biggest Cybercrime Takedown in History

November 10, 2011 Added by:Headlines

"The malware secretly altered the settings on infected computers enabling the defendants to digitally hijack Internet searches and re-route computers to certain websites and advertisements, which entitled the defendants to be paid. The defendants subsequently received fees each time..."

Comments  (0)


CERT Malaysia Releases DNSwatch Tool

August 30, 2011 Added by:Headlines

"DNSwatch will help you avoid known bad websites or sites that will trick your computer into downloading and installing malicious programs on your computer. Even better, DNSwatch will also prevent you from accessing malicious websites that you may not even know your computer is trying to access..."

Comments  (0)


Quiet Please - H4xing in Progress

August 10, 2011 Added by:David Martinez

I used this script from the BT5 How-To page, which grabs packets, redirects them through sslstrip, prints the info to my machine, and sends it to the end-user with a spoofed source. Within 30 minutes, I had at least 5 different passwords for FB, Twitter, G-mail, and others...

Comments  (0)


Interesting DNS Stuff - SRV Records

March 26, 2011 Added by:Rob Fuller

The following are good adds to your DNS brute force list. These are all SRV records so make sure your type is set correctly. SRV records tell you the port in the answer. I don't know of any DNS tools that utilize SRV as part of their process, but scripting dig to do so isn't tough...

Comments  (1)


Google Adds Authentication to Google Apps

February 04, 2011 Added by:Bill Gerneglia

By implementing DomainKeys Identified Mail (DKIM) at no additional cost to Google Apps users, the company says it is giving email senders a way to validate who they are in a manner that spam filters recognize, therefore ensuring higher message delivery rates to recipients...

Comments  (0)


The U.S. Already Has An Internet Kill Switch

February 04, 2011 Added by:Headlines

The U.S government already has the ability to control Internet access. The debate over legislating an "Internet Kill Switch" is not one of whether to create a mechanism to control Internet access, but one of who will legally exercise the power to limit accessibility and under what circumstances...

Comments  (0)


Are We IPv6 Ready? No, We Are Not

January 24, 2011 Added by:Antonio Ierano

IPv6 brings some caveats as a new addressing space that needs to be understood and correctly implemented: a lack of IPv6 services ready to be used (think the DNS name space resolution as an example); and most of all, a TCP\IP network infrastructure that is not IPv6 compliant at the moment...

Comments  (0)


Project Honeypot HTTP Blocklist Module

December 29, 2010 Added by:Rob Fuller

Project Honeypot does an amazing job at keeping detailed information on scanners / harvesters and brute forcers, the likes of which are the daily enemy of said admins. They offer a service called HTTP Block List or 'HTTP:BL'...

Comments  (0)


WikiLeaks Loses Their Domain Names

December 03, 2010 Added by:Headlines

WikiLeaks lost the domain names and, limiting access to the whistleblower website using the alphabetical web addresses. Amazon announced Wednesday they would no longer host the websites, but denies that it was because of pressure applied by Senator Joe Lieberman...

Comments  (0)


Understanding the Domain Name System

November 29, 2010 Added by:Global Knowledge

The DNS takes advantage of the context-based memory clues that names provide and translates those names into IP addresses. Network managers can also take advantage of this name to address mapping to control traffic to various servers in their networks...

Comments  (1)


Domain Name System and Cyber Security Vulnerability

October 11, 2010 Added by:Jon Stout

The original design of the Domain Name System did not include robust security features; it was designed to be a scalable and open distributed system with backwards compatibility, and attempts to add security were rudimentary and did not keep pace with malicious hackers...

Comments  (0)


How To Test for DNS Compatibility

July 16, 2010 Added by:Simon Heron

L.ROOT-SERVERS.NET was the first to switch to a signed copy of the root zone and can be used for testing. This version has been configured deliberately so that it cannot be validated. Its purpose is to allow operators to test whether they can receive signed responses cleanly...

Comments  (0)