Lecture 12: DNS Security Intro Flashcards
Who controls what the authoritative name servers says?
The domain owner
What is the most common exploit involving DNS?
Domain hijacking
What are the forms domain hijacking can take?
The complete seizure of a domain name and transferal of ownership to the malicious party
Malicious redirection of a domain name using the DNS system to point to an incorrect server address
What is the most common way a domain is hijacked?
Theft of domains
Attacker finds a way to access your register account, then using that info to gain access to your account and initiate transfers of your domain names to themselves or a third party
Why would attackers want to steal a domain name?
- Can point domain towards a server that offers a lookalike application to steal client information
- Use domain name and its existing user base to spread a political message
- Try to resell domain on the open market
What is some of the built in protection to make domain theft harder?
- ICANN requires a domain can’t be transferred between registrars within 60 days of the last registration change
- Many registrars offer some form of locking, placing a time lock on when a transfer can occur
What is request hijacking?
The attacker listens for DNS requests on the local network and responds to them with incorrect or malicious DNS responses
What type of hijacking does not require that the attacker have control of your register accounts or underlying domain name
Request hijacking
What are some of the forms of DNS request hijacking?
Cache poisoning
Subversion of DNS resolvers
How does DNS interception work?
- Hijacker listens for appropriate DNS requests
- Hijackers responds with an incorrect response before the actual DNS resolver returns its response
- Attack can then direct the user to an incorrect server IP for spoofing or blocking access
Why does DNS interception work?
- UDP DNS has no authentication procedure, client has no way of telling it has received a bogus response
- Attacker can spoof the sending IP address to make it look like it came from the correct resolver IP
What are the limitations of DNS interception?
- Attack must beat the DNS resolver in returning a response
- Attacker must be able to scan client traffic
- These kind of attacks will only hit a minimal number of users