Lecture 14: DNS Rebinding Flashcards

1
Q

What are rebinding attacks?

A

Abuse aspects of web browser security and the DNS system to load malicious code from a third party via a client side script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What policy do attackers using rebinding attacks try to get around?

A

Same Origin Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is same origin protocol?

A

Protects clients from malicious scripts by limiting what sources a client side script can access

Enforced by web browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Same origin policy is only applied to __

A

scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the fatal flow of same origin protocol?

A

Its based on hostname not IP address

Meaning we can make the name point to where ever we want

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is content security policy?

A

Gives web apps control over where resources can be loaded from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does same origin policy differ from content security?

A

SOP concerned with who a client side script can communicate with

CSP concerned with where a client may download resources from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the steps in a rebinding attack?

A
  1. Client requests a web page containing malicious javascript or other client side code
  2. The script forces a new DNS call. The attackers DNS server responds with a different IP address than the one it was originally point to
  3. The script can now make a connection to this different IP address without violating the same origin policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a solution for rebinding attacks?

A

Set very low TTL for DNS records so that they go stale and must be requested again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two ways to open resolvers?

A
  • Forcing minimum TTL
  • Filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of mitigation an be used to mitigate rebinding attacks

A
  • Mitigation by DNS resolvers
  • Mitigation by web browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do DNS resolvers mitigate rebinding attacks?

A

Resolver acts as the middleman, potentially stopping rebinding attacks by disrupting the DNS process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do web browsers mitigate rending attacks?

A

Uses pinning to lock the IP address of a domain for some minimum amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly