jueves, 25 de enero de 2024

DNSSEC, From An End-User Perspective, Part 3

In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases?

The following list are the attack types from the first post, where DNSSEC can protect the users:

  • DNS cache poisoning the DNS server, "Da Old way"
  • DNS cache poisoning, "Da Kaminsky way"
  • ISP hijack, for advertisement or spying purposes
  • Captive portals
  • Pentester hijacks DNS to test application via active man-in-the-middle
  • Malicious attacker hijacks DNS via active MITM

The following list are the attack types from the first post, where DNSSEC cannot protect the users:

  • Rogue DNS server set via malware
  • Having access to the DNS admin panel and rewriting the IP
  • ISP hijack, for advertisement or spying purposes
  • Captive portals
  • Pentester hijacks DNS to test application via active man-in-the-middle
  • Malicious attacker hijacks DNS via active MITM

If you are a reader who thinks while reading, you might say "What the hell? Am I protected or not???". The problem is that it depends… In the case where the attacker is between you and your DNS server, the attacker can impersonate the DNS server, downgrade it to a non DNSSEC aware one, and send responses without DNSSEC information.

Now, how can I protect against all of these attacks? Answer is "simple":
  1. Configure your own DNSSEC aware server on your localhost, and use that as a resolver. This is pretty easy, even I was able to do it using tutorials.
  2. Don't let malware run on your system! ;-)
  3. Use at least two-factor authentication for admin access of your DNS admin panel.
  4. Use a registry lock (details in part 1).
  5. Use a DNSSEC aware OS.
  6. Use DNSSEC protected websites.
  7. There is a need for an API or something, where the client can enforce DNSSEC protected answers. In case the answer is not protected with DNSSEC, the connection can not be established.

Now some random facts, thoughts, solutions around DNSSEC:

That's all folks, happy DNSSEC configuring ;-)

Note from David:
Huh, I have just accidentally deleted this whole post from Z, but then I got it back from my browsing cache. Big up to Nir Sofer for his ChromeCacheView tool! Saved my ass from kickin'! :D
Related news
  1. Hacking Tools 2020
  2. Best Hacking Tools 2020
  3. Hacking Tools For Mac
  4. Hacker Tools
  5. Best Hacking Tools 2020
  6. Hack Website Online Tool
  7. Pentest Tools Linux
  8. Hacker Tools Online
  9. Game Hacking
  10. Hack And Tools
  11. Hack Tools
  12. Hack Tools For Mac
  13. Hack And Tools
  14. Install Pentest Tools Ubuntu
  15. Pentest Tools Windows
  16. Pentest Tools Open Source
  17. Computer Hacker
  18. Hacking Tools For Windows Free Download
  19. Pentest Tools Framework
  20. Pentest Tools For Android
  21. Hacker Techniques Tools And Incident Handling
  22. Nsa Hack Tools Download
  23. Termux Hacking Tools 2019
  24. Hacking Tools Github
  25. Hack Tools For Ubuntu
  26. Hacker Search Tools
  27. Pentest Tools Port Scanner
  28. Hacker Tools
  29. Pentest Tools Bluekeep
  30. World No 1 Hacker Software
  31. Pentest Tools Port Scanner
  32. Hack Tools Github
  33. Hacker Techniques Tools And Incident Handling
  34. Hacking Tools Windows 10
  35. Pentest Tools Find Subdomains
  36. Nsa Hacker Tools
  37. Hacking Tools Github
  38. Pentest Tools Website
  39. Pentest Reporting Tools
  40. Hacking Tools For Kali Linux
  41. Hacking Tools Pc
  42. Free Pentest Tools For Windows
  43. Bluetooth Hacking Tools Kali
  44. Hacking Tools 2019
  45. Hacking Tools For Beginners
  46. Pentest Tools Windows
  47. Usb Pentest Tools
  48. Pentest Tools Website
  49. Pentest Tools Open Source
  50. Hacking Tools Kit
  51. Hack Tools Download
  52. Hack Tools Mac
  53. Install Pentest Tools Ubuntu
  54. Kik Hack Tools
  55. Hacking Tools Free Download
  56. Hacker Tools Linux
  57. Pentest Tools Free
  58. Hacker Hardware Tools
  59. Pentest Tools For Ubuntu
  60. Hacker
  61. Hackers Toolbox
  62. Wifi Hacker Tools For Windows
  63. Hack Tool Apk
  64. Hacker Tool Kit
  65. Bluetooth Hacking Tools Kali
  66. Hacking Tools 2019
  67. Hacking Tools Pc
  68. Pentest Tools Windows
  69. Kik Hack Tools
  70. Hack Tools For Windows
  71. Pentest Reporting Tools
  72. Hacker Tools Windows
  73. Tools Used For Hacking
  74. Hack Tools Pc
  75. Hacker Tools List
  76. Hak5 Tools
  77. Game Hacking
  78. Hacking Tools For Mac
  79. Hacker Tools For Pc
  80. Hack Tools
  81. Hacking Tools Usb
  82. New Hack Tools
  83. Hacker Techniques Tools And Incident Handling
  84. Pentest Tools For Android
  85. Android Hack Tools Github
  86. Top Pentest Tools
  87. Hacker Tools For Ios
  88. Hack Tool Apk
  89. Pentest Tools Url Fuzzer
  90. Pentest Tools Find Subdomains
  91. Hacking Tools And Software
  92. Hacking Tools
  93. Pentest Tools
  94. Hacking Tools Mac
  95. Top Pentest Tools
  96. Pentest Tools Find Subdomains
  97. Pentest Tools Free
  98. Pentest Tools List
  99. Hack Tools
  100. Pentest Tools For Android
  101. Hack Tools For Games
  102. Hack Tools For Games
  103. Hacker Tools
  104. Hacking Tools And Software
  105. Bluetooth Hacking Tools Kali
  106. Hacker Tools For Pc
  107. Pentest Tools Windows
  108. Usb Pentest Tools
  109. Pentest Tools Review
  110. Hacker Tools For Windows
  111. Pentest Tools Review
  112. Hacker Tools 2020
  113. Hacking Tools For Mac
  114. Hacking Tools For Mac
  115. Pentest Box Tools Download
  116. Underground Hacker Sites
  117. Pentest Tools Subdomain
  118. Pentest Tools Subdomain
  119. Pentest Tools For Windows
  120. How To Install Pentest Tools In Ubuntu
  121. Hack Tools Mac
  122. Ethical Hacker Tools
  123. Hack Tools 2019
  124. Beginner Hacker Tools
  125. Kik Hack Tools
  126. What Are Hacking Tools
  127. Pentest Tools Bluekeep
  128. Hacking Tools Mac
  129. Hacker Techniques Tools And Incident Handling
  130. Hacking Tools For Pc

No hay comentarios:

Publicar un comentario