Section 19.179 Domain Name System (DNS) Attacks Flashcards
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
Domain Name System (DNS)
Fundamental component of the internet that is responsible for translating human-friendly domain names into IP addresses that computers can understand
Some of the Various Types of DNS Attacks and Mitigation
DNS Cache Poisoning (DNS Spoofing)
Corrupts a DNS resolver’s cache with false information
● Redirects users to malicious websites
Mitigation:
○ Use DNSSEC (Domain Name System Security Extensions) to add digital signatures to DNS data
○ Implement secure network configurations and firewalls to protect DNS servers
Example: An attacker could poison the DNS cache
of a popular online banking website and then cause the bank’s users to be redirected to a fake website where their logging credentials could be stolen by the attackers.
Some of the Various Types of DNS Attacks and Mitigation
DNS Amplification Attacks
Overwhelms a target system with DNS response traffic by exploiting the
DNS resolution process
● Spoofed DNS queries sent to open DNS servers
Mitigation:
○ Limit the size of DNS responses
○ Rate limit DNS response traffic to reduce the impact
Example: if an attacker could send a small query
to an open DNS server to request a large amount of data like the entire list of hosts in the domain,
this will be sent to the victim’s IP address which in turn causes a flood of unwanted traffic which can appear to look like a DOS attack against a victim’s system.
Some of the Various Types of DNS Attacks and Mitigation
DNS Tunneling
Encapsulates non-DNS traffic (e.g., HTTP, SSH) over port 53 to bypass firewall rules for command and control or data
exfiltration
Mitigation
○ Monitor and analyse DNS logs for unusual patterns indicating tunneling
Example: an attacker could use DNS tunneling
to bypass a company’s firewall and to exfiltrate sensitive organizational data Since DNS requests are usually allowed to pass through a firewall without inspection, DNS tunneling is quite effective for sneaking data out of a given network.
Some of the Various Types of DNS Attacks and Mitigation
Domain Hijacking (Domain Theft)
Unauthorised change of domain registration
● May lead to loss of website control and redirection to malicious sites
Mitigation
○ Regularly update and secure registration account information
○ Use domain registry lock services to prevent unauthorised
changes
Example: if an attacker could hijack a popular e-commerce website domain like amazon.com, they can redirect all of Amazon’s traffic to a fake website where a customer’s payment information could be stolen.
Some of the Various Types of DNS Attacks and Mitigation
DNS Zone Transfer Attacks
The attacker tries to get a copy
of the entire DNS zone data, which includes all of the DNS records for domain by pretending to be an authorised system making that request.
● Exposes sensitive information about a domain’s network infrastructure
● Could be used for reconnaissance in future attacks