Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

DNS Best Practices, Network Protections, and Attack Identification - 40

Cisco SecurityPosted 6 Years Ago
  • This takes a deep dive into what DNS is and different attacks against it. This is quite the intense explanation of DNS.
  • Multiple attacks exist: Cache poisoning, DNS Amplification and Reflection Attacks, Abusing the TTL (time to live) and DNS rebinding that are very common. This article explains many attacks, with many great mitigation's for these attacks.
  • Defenses:
    • Randomization for DNS Transaction Identifier: Attackers need to be able to predict this identifier for several different attacks. Randomizes the value makes it very difficult to attack.
    • IP Source Guard: Helps stop spoofed IP traffic.
    • Access Control Lists: A list for where people using the DNS service can visit.
    • Do not use open resolving.