Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division



Similar documents
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Copyright

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

Understand Names Resolution

CDN SERVICE ICSS ROUTE MANAGED DNS DEUTSCHE TELEKOM AG INTERNATIONAL CARRIER SALES AND SOLUTIONS (ICSS)

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

Glossary of Technical Terms Related to IPv6

How to Add Domains and DNS Records

Internet Security [1] VU Engin Kirda

How to Configure the Windows DNS Server

Talk-101 User Guide. DNSGate

FAQ (Frequently Asked Questions)

The Domain Name System

1 Introduction: Network Applications

Chapter 9: Name Services. 9.1 Introduction 9.2 Name services and the DNS 9.3 Directory services 9.6 Summary

ECE 4321 Computer Networks. Network Programming

Internet-Praktikum I Lab 3: DNS

DNS. Computer Networks. Seminar 12

The Domain Name System (DNS)

The Domain Name System

The Domain Name System from a security point of view

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Introduction to Network Operating Systems

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

Windows 2008 Server. Domain Name System Administración SSII

Installing and Setting up Microsoft DNS Server

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

- Domain Name System -

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

Domain Name System (DNS) Fundamentals

Computer Networks: Domain Name System

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

DNS and Interface User Guide

Domain Name System (DNS)

Understanding DNS (the Domain Name System)

Lab - Observing DNS Resolution

Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers

Application Protocols in the TCP/IP Reference Model

How To Guide Edge Network Appliance How To Guide:

Using the Domain Name System for System Break-ins

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System

Domain Name Server. Training Division National Informatics Centre New Delhi

Use Domain Name System and IP Version 6

Module 2. Configuring and Troubleshooting DNS. Contents:

what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference

Networking Domain Name System

Domain Name System (DNS) RFC 1034 RFC

DNS Resolving using nslookup

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

How-to: DNS Enumeration

DNSSEC Applying cryptography to the Domain Name System

INFORMATION SECURITY REVIEW

My Services Online Service Support. User Guide for DNS and NTP services

DNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring Paul Semple psemple@rm.

Introduction to the Domain Name System

3. The Domain Name Service

Domain Name System. Heng Sovannarith

Fasthosts Internet Parallels Plesk 10 Manual

Using Webmin and Bind9 to Setup DNS Sever on Linux

Introduction to Computer Security Benoit Donnet Academic Year

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

DNS + DHCP. Michael Tsai 2015/04/27

NET0183 Networks and Communications

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Networking Domain Name System

Remote DNS Cache Poisoning Attack Lab

Switching Your DNS WiredTree

Coordinación. The background image of the cover is desgned by GUIDE TO DNS SECURITY 2

Polycom RealPresence Resource Manager System Getting Started Guide

Where every interaction matters.

Proxies. Chapter 4. Network & Security Gildas Avoine

Clear and Present Danger Increase in Number of DNS AAAA Queries


API of DNS hosting. For DNS-master and Secondary services Table of contents

DNS Domain Name System

Understanding DNS: Essential knowledge for all IT professionals

Chapter 2 Application Layer

DNS : Domain Name System

The Domain Name System (DNS)

THE DOMAIN NAME SYSTEM DNS

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

DOMAIN NAME SECURITY EXTENSIONS

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

Security of IPv6 and DNSSEC for penetration testers

DNS Pharming Attack Lab

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12

Section 1 Overview Section 2 Home... 5

Domain Name System :49:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

DNS at NLnet Labs. Matthijs Mekking

Lab - Observing DNS Resolution

The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)

Transcription:

Lesson 13: DNS Security Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division

Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation of easy to remember addresses into the addresses that computers understand. www.intypedia.com 217.76.128.47 2

DNS Architecture Hierarchical Structure top-level domains Client 3

DNS Architecture Hierarchical Structure Root servers: distributed worldwide and of critical security Top-level domains (TLD) General (.com,.edu,.org,.net ) National (.es,.fr,.us,.co.uk ) Domain Resolution Iterative or recursive query DNS Records 4

DNS Architecture DNS Records The database inside every DNS server uses records to organize the information record A, AAAA, CNAME, HINFO, MX, NS, PTR, SOA, SPF A = Address used to translate host server names into IPv4 addresses CNAME = Canonical Name used to create additional host server names or aliases for the domain's host servers MX (registry) = Mail Exchange associates a domain name with a list of mail exchange servers for that domain PTR = Pointer also known as 'reverse record', does the opposite of record A; it translates IP addresses into domain names 5

Flow of a Domain Request (Web Browser) DNS Operating System's "Hosts" File Operating System Cache Browser Cache 6

Basic Attacks Changing the "hosts" file Targeted User's Operating System Changing the DNS query commands Changing the DNS in the Internet connection settings Attacked DNS Changing logs 7

Pharming and its Purposes Attacks related to the resolution of domains are called Pharming Redirecting traffic directed to a legitimate server to a bogus one, for example: Stealing user names and passwords to access websites that require login, like: banks, social networks, online games, etc. Intercepting communications 8

DNS Cache Poisoning Attack Attacker 4 1 Legitimate DNS 2 Attacking DNS 5 3 6 Victim 9

DNS ID Spoofing with Sniffing Attack 4 1 3 Bogus Web Server Victim 2 Legitimate DNS Legitimate Web Server Attacker 10

DNS Cache Snooping Attack The attacker sends queries to a DNS to find out the domains it has in its cache Knowing the domains others have visited: banks, political parties, medical information... Makes it easier to perform other attacks like phishing, social engineering or exploitation of vulnerabilities 11

Man-in-the-middle Attack 1 2 4 3 Victim Attacker Legitimate Web Server 12

Safe Use of Domain Resolution (End Users) Local access control to the OS Updating the OS and software Installing and configuring an antivirus and a firewall Avoid installing software that isn't trusted Being aware of security alerts that browsers show us in the server certificates that are used in HTTPS connections 13

Securing the DNS (1 of 2) Secure Access Control User awareness of the existence and methods of social engineering Traceability of who, what and when the information contained in the DNS is modified Effective monitoring system 14

Securing the DNS (2 of 2) Using the latest versions of the software associated with the DNS and performing regular updates Configuring the DNS appropriately Limiting, if possible, the networks from which the DNS cache is accessible 15

Contact: info@intypedia.com