Jaeson Schultz Threat Research Engineer
|
|
|
- Ernest Anthony
- 10 years ago
- Views:
Transcription
1 Jaeson Schultz Threat Research Engineer April Cisco and/or its affiliates. All rights reserved. 1
2 What is bitsquatting? Why should we care? Discussion of new bitsquatting attacks Bitsquatting statistics Mitigations for bitsquatting attacks 2013 Cisco and/or its affiliates. All rights reserved. 2
3 2013 Cisco and/or its affiliates. All rights reserved. 3
4 Bitsquatting is a form of cybersquatting which specifically targets bit errors in computer memory A memory error occurs any time one or more bits being read from memory have changed state from what was previously written By changing a single bit, a target domain such as twitter.com can become the bitsquat domain twitte2.com An attacker can simply register a bitsquat domain, wait for a memory error to occur, and afterwards intercept traffic, infect the client, 2013 Cisco and/or its affiliates. All rights reserved. 4
5 2013 Cisco and/or its affiliates. All rights reserved. 5
6 Cosmic Rays High energy particles that strike the Earth as frequently as 10,000 per square meter per second Heat Operating a device outside the recommended operating environment. Nuclear Explosions Intense neutron emission from low yield nuclear explosions induce a sharp increase in the frequency of bitsquat requests Defects in Manufacturing Errors in memory have been traced to alpha particle emissions from chip packaging materials Cisco and/or its affiliates. All rights reserved. 6
7 Original bitsquatting research was by Artem Dinaburg from Raytheon. He focused on bit flips in the characters of 2 nd level domains and demonstrated that bitsquatting works! Python code was released by Dinaburg to compute bitsquats: Duane Wessels of VeriSign followed up with bitsquatting research that confirmed that the bit errors were not a result of the network DNS resolution process. (UDP checksums work) 2013 Cisco and/or its affiliates. All rights reserved. 7
8 2013 Cisco and/or its affiliates. All rights reserved. 8
9 RFC1035 declared the valid syntax for domain name labels, which was later refined under RFC1123. According to these RFCs, the only valid characters inside a domain name are: 1. A-Z 2. a-z (hyphen) The dots. which separate subdomains can also experience bit errors that cause them to become a lowercase n and vice versa Cisco and/or its affiliates. All rights reserved. 9
10 If a second level domain name contains the letter n and there are two or more characters after the letter n, then this is a potential bitsquat. Two example domains: windowsupdate.com has bitsquat dowsupdate.com symantecliveupdate.com has bitsquat tecliveupdate.com 2013 Cisco and/or its affiliates. All rights reserved. 10
11 2013 Cisco and/or its affiliates. All rights reserved. 11
12 2013 Cisco and/or its affiliates. All rights reserved. 12
13 If a 2 nd level domain name uses 3 rd level subdomains, these can be leveraged into bitsquat domains by replacing the. separating the 3 rd and 2 nd level domain labels with the letter n. Three example domains: s.ytimg.com has bitsquat snytimg.com mail.google.com has bitsquat mailngoogle.com state.ny.us has bitsquat statenny.us 2013 Cisco and/or its affiliates. All rights reserved. 13
14 2013 Cisco and/or its affiliates. All rights reserved. 14
15 2013 Cisco and/or its affiliates. All rights reserved. 15
16 2013 Cisco and/or its affiliates. All rights reserved. 16
17 One of the most popular contexts for a domain name to appear is inside of a URL, especially over HTTP. For example, look at the popularity of the bitsquat domains which was originally published by Dinaburg in his 2011 research paper: 2013 Cisco and/or its affiliates. All rights reserved. 17
18 Inside a URL or href, forward slash characters / will act as delimiters separating the scheme from the hostname from the URL path The letter o can flip a bit to become the forward slash character /, cutting short the domain name Cisco and/or its affiliates. All rights reserved. 18
19 Possible when a domain name in a URL contains the letter o and the preceding characters form a valid second level domain name. Most interesting aspect of this method is that domains at nonpublic Top Level Domains (TLDs) can be targeted. A few examples: tcoss.scott.af.mil has bitsquat tcoss.sc bop.peostri.army.mil has bitsquat bop.pe ecampus.phoenix.edu has bitsquat ecampus.ph trading.scottrade.com has bitsquat trading.sc 2013 Cisco and/or its affiliates. All rights reserved. 19
20 2013 Cisco and/or its affiliates. All rights reserved. 20
21 Sometimes the slashes inside a URL or href can experience a bit error and become a lowercase letter o URLs will contain at least 2 slashes First 2 slashes separate scheme from hostname, a third slash may separate the hostname from the path. Generally only bit flips of the second slash produce viable bitsquat domains 2013 Cisco and/or its affiliates. All rights reserved. 21
22 Some domains do not use 3 rd level subdomain names. For example, the domain slashdot.org. When a domain does not use 3 rd level subdomains, it can be vulnerable to some additional types of URL delimiter bitsquats. For example consider the URL: After a bit error in the second forward slash the URL becomes: Though the syntax is not valid, your web browser will typically helpfully correct for the missing slash and direct traffic to the domain oslashdot.org. As of December 2012 the team from no- have catalogued 60,000 domains that do not use 3 rd level subdomains 2013 Cisco and/or its affiliates. All rights reserved. 22
23 If a domain name does not use 3 rd level subdomains and begins with the letter o it can be susceptible to another obscure form of URL delimiter bitsquat. For example consider the URL: After a bit error the URL becomes: Though the syntax is not valid, your web browser will helpfully correct for the extra slash and direct traffic to the domain reilly.com 2013 Cisco and/or its affiliates. All rights reserved. 23
24 Inside a URL, anchor characters # will act as delimiters separating the the hostname from the anchor location on the web page The letter c can flip a bit to become the pound character #, cutting short the domain name Cisco and/or its affiliates. All rights reserved. 24
25 Attack is possible when a domain in a URL contains the letter c and the preceding characters form a valid second level domain name. Bad syntax is, like before, OK. Similar to the o / bitsquats, this method allows for targeting domains at non-public Top Level Domains (TLDs) such as.mil,.gov,.edu. Some examples: cgportal2.uscg.mil has bitsquat cgportal2.us certauth.bechtel.com has bitsquat certauth.be emergency.cdc.gov has bitsquat emergency.cd pki.nrc.gov has bitsquat pki.nr isbc.com.cn has bitsquat isbc.com 2013 Cisco and/or its affiliates. All rights reserved. 25
26 2013 Cisco and/or its affiliates. All rights reserved. 26
27 2013 Cisco and/or its affiliates. All rights reserved. 27
28 Bit errors can occur anywhere, so why not in the TLD? Most of the generic TLDs (gtlds) have no bitsquats whatsoever. Two gtlds contain URL Delimiter type bitsquats stemming from the presence of the letter o. These are the gtlds.pro and.coop with corresponding URL delimiter type bitsquats at the country code TLDs (cctlds):.pr (Puerto Rico) and.co (Colombia) respectively It s a positive thing then that relatively few URLs exist that point to.pro and.coop 2013 Cisco and/or its affiliates. All rights reserved. 28
29 There happen to be several cctlds where bitsquats exist. It is interesting to note that some cctlds have no valid bitsquats while other cctlds have many. After surveying all valid Internet TLDs and checking the number of possible bitsquats, the following was found: 2013 Cisco and/or its affiliates. All rights reserved. 29
30 2013 Cisco and/or its affiliates. All rights reserved. 30
31 2013 Cisco and/or its affiliates. All rights reserved. 31
32 2013 Cisco and/or its affiliates. All rights reserved. 32
33 In 2013 ICANN is approving a number of new gtlds. Some of these proposed new gtlds contain subdomain delimiter bitsquats for the entire TLD. Possessing one of these would allow the attacker to mount a bitsquat attack against all domains registered under the target gtld Cisco and/or its affiliates. All rights reserved. 33
34 Several of the proposed new gtlds will have letter o based URL delimiter bitsquats in cctld space 2013 Cisco and/or its affiliates. All rights reserved. 34
35 Several of the proposed new gtlds will also have letter c based URL delimiter bitsquats in cctld space 2013 Cisco and/or its affiliates. All rights reserved. 35
36 The.uk (United Kingdom) cctld has one cctld bitsquat. The bitsquat cctld is.tk (Tokelau) The.uk domain registrar Nominet restricts.uk domain names to one of 13 2 nd level domain prefixes. For example, co.uk, net.uk, org.uk, and so on. 6 of the 13 2 nd level.tk domains are available. By registering one of these domains, a bitsquatter would receive bitsquats for any domain underneath the corresponding 2 nd level domain in.uk 2013 Cisco and/or its affiliates. All rights reserved. 36
37 2013 Cisco and/or its affiliates. All rights reserved. 37
38 Looking at the domain whois records for some of the bitsquat domains that have already been registered yields some interesting findings: The bitsquat domain wwwnfacebook.com was registered back in 2009, a full 2 years before the initial research paper on bitsquatting was published The bitsquat domain otwitter.com was registered in The bitsquat domain wwwnyoutube.com was registered in Some of the earliest bitsquat domain registrations, such as wwwnfacebook.com have come from "domainers" --organizations that register domain names to place ads or redirect traffic for profit. These domainers essentially noticed and capitalized on traffic destined for bitsquat domains likely unaware of the reason for the traffic Cisco and/or its affiliates. All rights reserved. 38
39 Use Error Correcting (ECC) memory. Needs to happen simultaneously, and world-wide to be an effective solution. Register the bitsquat domain so that no third party can register it. This is not always possible, as many popular bitsquat domains have already been registered. Depending on the length of the domain, this can also be a costly endeavor. We can do better than this 2013 Cisco and/or its affiliates. All rights reserved. 39
40 Because some of these new bitsquatting techniques rely on 3 rd level domain names to work, then a careful strategy around their selection and use can help avoid the possibility of bitsquats Subdivide 2 nd level domain traffic among a large number of 3 rd level domains. Each subdomain takes on a small slice of the overall potential bitsquat traffic and therefore becomes much less likely to result in a successful bitsquat attack. Using a large number of subdomains creates much more work and expense for a potential bitsquat attacker. If additionally those subdomains are changed or updated with any frequency, a bitsquatter will have practically no chance at a successful attack Cisco and/or its affiliates. All rights reserved. 40
41 Amazon includes in their web pages content from a domain named cloudfront.com. The 3rd level domain names here normally would make great URL delimiter bitsquats because the o in cloudfront yields a valid cctld in.cl (Chile) Amazon changes the subdomain at cloudfront.com frequently enough that this thwarts attempts to capitalize on bitsquat traffic. By changing the 3rd level domain name frequently enough Amazon leaves too small a window of time in which to set-up and collect bitsquat traffic Cisco and/or its affiliates. All rights reserved. 41
42 The majority of the bitsquat requests that Dinaburg received during his original bitsquatting research came from domain variants of Facebook s content delivery network fbcdn.net. Facebook is a web application. The web application design can be changed to help reduce the number of times the domain name appears in memory, thus reducing the number of opportunities for a bitsquat request. Using relative links inside of HTML instead of absolute links reduces the number of appearances of the domain name. With a base href, the domain name will appear at most once per HTML page. The downside is that if a bit error does occur in the base href, then all links in the document would go to the same bitsquat domain Cisco and/or its affiliates. All rights reserved. 42
43 2013 Cisco and/or its affiliates. All rights reserved. 43
44 Capital ASCII characters are equivalent for DNS and URL hostname purposes, but possess fewer bitsquat variants There are no bitsquats of capital letters in the range 0-9 The. is not a bit error variant of the capital letter N, only the lowercase n The / is not a bit error variant of the capital letter O, only the lowercase o The # is not a bit error variant of the capital letter C, only the lowercase c By simply substituting capital letters whenever lowercase letters c and n through y appear in a domain name, some bitsquat variants can be avoided Cisco and/or its affiliates. All rights reserved. 44
45 2013 Cisco and/or its affiliates. All rights reserved. 45
46 Create a RPZ containing bitsquats of popular or internal-only domains. These bitsquat domains can be configured with CNAMEs that point at the real domain, so your DNS resolver silently corrects bit errors without any work on the part of the client experiencing the bit error. There is a bitsquat domain of paypal.com called raypal.com. It is a real site, and not affiliated with PayPal, but it would be much more likely for a network s users to be going to paypal.com instead. Therefore, some of these legitimate sites could either be whitelisted or just be counted as acceptable FPs Cisco and/or its affiliates. All rights reserved. 46
47 Bitsquatting is easier than it ever has been given the number of devices attached to the internet which lack error correcting memory. Bitsquatting will become easier to do over time. Bitsquatting affects many more domains than just the most popular. Less popular sites, and sites registered at protected TLDs like.gov,.edu, and.mil are vulnerable to some of these new techniques. Guarding against bitsquatting need not involve mass registration of domain names: Creative use of subdomains, use of relative hrefs in HTML, and use of href hostnames in CAPS can all help reduce the incidence of successful bitsquats. And since DNS is critical for bitsquatting attacks, using a DNS resolver with an RPZ that blocks/redirects likely bitsquat requests can provide the ultimate protection Cisco and/or its affiliates. All rights reserved. 47
48 Special thanks to the following individuals. Without their assistance this research would not have been possible: Thank you. Seth Hanford Adam Katz Gavin Reid Allyn Romanow Henry Stern 2013 Cisco and/or its affiliates. All rights reserved. 48
49 Thank you Cisco and/or its affiliates. All rights reserved. 49
Examining the Bitsquatting Attack Surface
White Paper Examining the Bitsquatting Attack Surface Bit errors in memory, when they occur in a stored domain name, can direct Internet traffic to the wrong domain potentially compromising security. When
Detecting Search Lists in Authoritative DNS
Detecting Search Lists in Authoritative DNS Andrew Simpson March 10 th, 2014 Summary Early research into name collisions has postulated that search list interaction drives some portion of the DNS requests
New gtld Basics New Internet Extensions
New gtld Basics New Internet Extensions Agenda Overview about domain names, gtld timeline and the New gtld Program Why is ICANN doing this; potential impact of this initiative to businesses, governments,
IDP. User Manual v3.0. Section 4: Domain Transfers. www.safenames.net
IDP User Manual v3.0 Section 4: Domain Transfers www.safenames.net Table of Contents Domain Transfers... 3 Transfers In... 3 Transfers Out UNLOCK domains.... 7 Where do I find my AuthCode / Domain Password?...
The IANA Functions. An Introduction to the Internet Assigned Numbers Authority (IANA) Functions
The IANA Functions An Introduction to the Internet Assigned Numbers Authority (IANA) Functions Contents SECTION 1: INTRODUCTION 4 SECTION 2: POLICY, STAKEHOLDERS AND STEWARDSHIP IMPLEMENTATION 6 SECTION
DNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
Threat Spotlight: Angler Lurking in the Domain Shadows
White Paper Threat Spotlight: Angler Lurking in the Domain Shadows Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant
DNS Security Survey for National Computer Security Incident Response Teams December 2010
DNS Security Survey for National Computer Security Incident Response Teams December 2010 Summary As referenced during the ICANN meeting in Brussels, Belgium in June 2010, ICANN developed a survey on DNS
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
IANA Functions to cctlds Sofia, Bulgaria September 2008
IANA Functions to cctlds Sofia, Bulgaria September 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers What is IANA? Internet Assigned Numbers Authority
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
Importance of Website Domain Ownership for Managing your Brand
Importance of Website Domain Ownership for Managing your Brand Kerigan Marketing Associates Ford Henley Digital Marketing Manager February 24, 2015 850.229.4562 3706 Hwy 98, Suite 103 Mexico Beach, FL
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314
NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2002 LETTER NO.: 02-CU-16 TO: All Federally-Insured Credit Unions SUBJ: Protection of Credit Union Internet Addresses
Guidance for Preparing Domain Name Orders, Seizures & Takedowns
Guidance for Preparing Domain Name Orders, Seizures & Takedowns Abstract This thought paper offers guidance for anyone who prepares an order that seeks to seize or take down domain names. Its purpose is
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
DOMAIN AND EMAIL GLOSSARY The phrases and terms you may encounter, when registering a domain name
DOMAIN AND EMAIL GLOSSARY The phrases and terms you may encounter, when registering a domain name Don t know your Registrar from your Registry? No idea what a Name server actually does? Well, don t worry.
CYBERSECURITY INESTIGATION AND ANALYSIS
CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,
The Proposal for Internationalizing cctld Names
The Proposal for Internationalizing cctld Names By Chinese Domain Name Consortium (CDNC) June 2005 Introduction The Internet from its birth was in English. In its early years in the United States of America,
ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model
ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model Anne Rachel Inné, Giovanni Seppia Regional Liaisons Aurelio Peccei Lecture 4 April 2007 1 Presentation overview The
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP
Configuring a Domain to work with your Server
Configuring a Domain to work with your Server If you have a domain name registered with a third party and would like to use that domain with your Tagadab server (Virtual or Dedicated) then you have several
DomainWire. Edition 11 Q1 2015. Council of European National Top level Domain Registries - www.centr.org
DomainWire Edition 11 Q1 2015 Global TLD Stat Report DomainWire Stat Report is CENTR s quarterly publication covering status and trends in global top-level domains with a focus on European cctlds (country
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
Pre Delegation Testing (PDT) Frequently Asked Questions (FAQ)
Pre Delegation Testing (PDT) Frequently Asked Questions (FAQ) [Ver 1.7 2013-06- 04] List of contents General questions Who do I contact with questions about Pre- Delegation Testing?... 3 What is the process
.ASIA Reserved Names Policies
Prepared by: DotAsia Organisation Date: 10-Aug-2007 Reference #: N/A Status: Complete Version: 2.0 Executive Summary This document describes the Reserved Names Policies for the.asia Registry. These policies
OVERVIEW OF THE DNS AND GLOSSARY OF TERMS
PROTECT YOUR BUSINESS D-Zone Anycast DNS Service OVERVIEW OF THE DNS AND GLOSSARY OF TERMS 1 PROTECT YOUR BUSINESS OVERVIEW OF THE DNS AND GLOSSARY OF TERMS The DNS is a technology that most IT managers
Overview of DNSSEC deployment worldwide
The EURid Insights series aims to analyse specific aspects of the domainname environment. The reports are based on surveys, studies and research conducted by EURid in cooperation with industry experts
Toba Obaniyi CEO, Whogohost Limited @2016 Media College
Nigeria s Largest Hosting Provider A guide to choosing the right domain name Presented by: Toba Obaniyi CEO, Whogohost Limited @2016 Media College Introduction 2 A domain name is an online identity, and
Radix Reserved Names Policy
Radix Reserved Names Policy 1. Introduction This policy describes Radix FZC s and its subsidiaries ( Radix ) Reserved Names Policy as it applies to all new top-level domains operated by Radix subsidiaries
QUESTIONS AND ANSWERS
TECHNOLOGY CONSULTANCY Innovative. Reliable. Efficient. QUESTIONS AND ANSWERS WEB HOSTING SERVICES What you need to know about Web Hosting Q&A - WEBHOSTING 1. What is web hosting? Web Hosting is a service
<.bloomberg> gtld Registration Policies
gtld Registration Policies General Statement... 2 Definitions... 2 String Requirements... 3 Reserved Names... 3 Name Collision... 3 Acceptable Use... 4 Reservation of Rights... 4 Rapid Takedown
The Use of DNS Resource Records
International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,
655 Third Avenue, 10th Floor New York, NY 10017-5646, USA t: +1-212-642-1700 f: +1-212-768-7796 inta.org
655 Third Avenue, 10th Floor New York, NY 10017-5646, USA t: +1-212-642-1700 f: +1-212-768-7796 inta.org Comments of the Internet Committee of the International Trademark Association on: Nominet s Consultation
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
.AXA Domain Policy. As of March 3, 2014
.AXA Domain Policy As of March 3, 2014 The.AXA TLD, also designated as the AXA domain or dot-axa, is a generic Top Level Domain string exclusively developed for the AXA insurance group and will be therefore
Web Hosting 101. with Patrick McNeil
Web Hosting 101 with Patrick McNeil Alphabet soup Why learn the technical side? To help your clients solve problems To help you work better with your tech team To better understand how the web works To
Internationalizing the Domain Name System. Šimon Hochla, Anisa Azis, Fara Nabilla
Internationalizing the Domain Name System Šimon Hochla, Anisa Azis, Fara Nabilla Internationalize Internet Master in Innovation and Research in Informatics problematic of using non-ascii characters ease
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
Vodafone Business Product Management Group. Web and Domain Frequently Asked Questions (FAQs)
Vodafone Business Product Management Group Hosted Services Web and Domain Frequently Asked Questions (FAQs) Vodafone Group 2010 Other than as permitted by law, no part of this document may be reproduced,
An introduction to IANA Presentation Notes
An introduction to IANA Presentation Notes Date 29 September 2008 Contact Kim Davies, Manager of Root Zone Services [email protected] While the Internet is renowned for being a worldwide network free
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
Arabic Domain Names. Dr. Abdulaziz H. Al-Zoman Director of SaudiNIC Chairman of Steering Committee - ADN Pilot Project [email protected].
Arabic Domain Names Pilot Project Dr. Abdulaziz H. Al-Zoman Director of SaudiNIC Chairman of Steering Committee - ADN Pilot Project [email protected] Agenda Introduction What is the problem? Internet in
DHCP and DNS Protocols
DHCP and DNS Protocols DHCP (Dynamic Host Configuration Protocol) is an industry standard protocol that lets a DHCP server (Unix/Window/As400 system) allocate temporary IP addresses and other network parameters
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
The future of International SEO. The future of Search Engine Optimization (SEO) for International Business
The future of International SEO The future of Search Engine Optimization (SEO) for International Business Whitepaper The World Wide Web is now allowing special characters in URLs which means crawlers now
Background. 12/F Daily House, 35-37 Haiphong Road, Tsim Sha Tsui, Hong Kong T: +852 2244 7900 _F: +852 2244 7902 www.dotkids.asia
DOTKIDS FOUNDATION Committee on the Rights of the Child - 2014 Day of General Discussion Submission The Unaware Revolution on Cyberspace bringing influence to Children Background The Internet Corporation
HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
OpenSRS Storefront Reseller Setup Guide
OpenSRS Storefront Reseller Setup Guide OpenSRS Storefront is a fully hosted, brandable ecommerce site that allows you to start selling domains immediately. Storefront handles all the end-user billing
NAME. Internationalized Domain Names (IDNs) -.IN Domain Registry. Policy Framework. Implementation
.भ रत (.BHARAT) Country Code Top Level DOMAIN (cctld) NAME Internationalized Domain Names (IDNs) -.IN Domain Registry Policy Framework & Implementation Government of India Ministry of Communications &
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014. Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1
.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, 2014 Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY 2014 1 Background 1..bio (also designated as the ".BIO domain") is a generic Top-Level
Domain Name Industry. Comparing ZA with the rest
Domain Name Industry Comparing ZA with the rest Key Defini)ons ZADNA:.ZA Domain Name Authority DNS: cctld: gtld: ICANN: SLD: Domain Name System country code Top Level Domain.za.uk.ke generic Top Level
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource
The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF
Configuring an External Domain
Configuring an External Domain SUPPORT GUIDE DOMAINS ABOUT THIS GUIDE This guide will instruct you on how to: Use an existing domain name Set Up Your Domain to Use Tagadab Name Servers Use Your VPS/Dedicated
Internet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
Phishing Trends Report
Phishing Trends Report Analysis of Online Financial Fraud Threats Second Quarter, 2009 For more information, please contact: [email protected] 888.239.6932 www.internetidentity.com Internet Identity
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
Quick Start Guide Getting started with your Hetzner package
Welcome to Hetzner! This guide will show you how to setup your domain name, website and email services you have subscribed to. Before getting started, it is important to understand that when you order
.hitachi Domain Name Registration Policies
.hitachi Domain Name Registration Policies (May 12, 2014) Contents Contents... 2 Definitions... 3 Introduction... 5 Launch Phases... 5 Chapter 1.Domain Name Registration and Allocation... 6 1.1.Purpose
Appendix D: Configuring Firewalls and Network Address Translation
Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.
