Unit 7: DHCP, DNS, and Switch Attacks and Mitigations 7.2 Additional Resources Additional Resour...

mac2022-06-30  25

RESOURCES

HOSTS.TXT

Before DNS (Domain Name System) hit the networking scene in 1984, a text file called HOSTS.TXT was manually maintained and shared by Stanford Research Institute for the  ARPANET (Advanced Research Projects Agency Network). The file mapped networks, gateways, and host names to IP address for member organizations. Check it out.

someonewhocares.org

What can AV (Antivirus) software do with the hosts file? Here’s a look at possibly the greatest example.

someonewhocares.org is updated nearly every day. It maps 127.0.0.1 to all different types of sites (shock sites, hijack sites, spyware sites, malware sites, ad sites, spam sites, and more). Scroll and read all the way down. Then, simply copy and paste the text from this site right into your hosts file. Come back for updates from time to time. It’s updated almost every day. That’s what AV software does. AV software maps 127.0.0.1 to known malicious domains. Instead of your machine going to a known malicious domain, you’ll see one of those “this site can’t be reached” messages in your browser window, and this time, it’s a good thing.

Network Penetration Tools

dsniffGobblerYersinia

DNS Attacks

Distributed denial-of-service attacks on root nameservers, WikipediaHow and why the leap second affected Cloudflare DNS, John Graham-Cumming, CloudflareSwitcher hacks Wi-Fi routers, switches DNS, Alex Drozhzhin, Kaspersky Lab

Dyn

DDoS attack Friday hits Twitter, Reddit, Spotify and others, Greg Masters, SC MediaMirai botnets linked to massive DDoS attacks on Dyn DNS, Flashpoint says, Teri Robinson, SC MediaResearchers blame Dyn DDoS attack on script kiddies targeting video game company, Darlene Storm, ComputerworldLessons From the Dyn DDoS Attack, Bruce Schneier, Schneier on SecurityAre Mirai DDoS attacks a wake-up call for IoT industry?, Bradley Barth, SC MediaHow the Consumer Product Safety Commission is (Inadvertently) Behind the Internet’s Largest DDoS Attacks, Matthew Prince, Cloudfare

DNSChanger

How to detect and fix a machine infected with DNSChanger, Topher Kessler, CNETFBI Shuts Down DNSChanger Servers, Chloe Albanesius, PC Magazine

DHCP Attacks

Microsoft update knocks Windows 8 and 10 users offline, E Hacking News [EHN]

ISC

ISC to Patch Versions of DHCP Vulnerable to DoS, Chris Brook, ThreatpostCVE-2016-2774: An attacker who is allowed to connect to DHCP inter-server communications and control channels can exhaust server resources, Michael McNally, ISC Knowledge BaseBash Bug Saga Continues: Shellshock Exploit Via DHCP, Akash Sharda, Trend Micro Incorporated

DNSSEC

DNSSEC: An Introduction, Nick Sullivan, CloudFlareDNSSEC: Complexities and Considerations, Nick Sullivan, CloudFlare

Concepts

How DNSSEC Works, CloudFlareThe DNSSEC Root Signing Ceremony, CloudFlareDNSSEC Complete Howto – How DNSSEC Works, Peter, The Noc CaveDNSSEC – The DNSKEY and DS record, Long-term Memory

KSK Rollover Planning

DNS Root Zone KSK Rollover, Casa de Internet de Latinoamérica y el CaribeDNS Root Zone KSK Rollover, APNICDNSSEC New Root Zone KSK appears on the DNS, Amreesh Phokeer, AFRINICICANN’s KSK Rollover: What You Need to Know, Erin Scherer, TeamARIN2017 Root Key Rollover – What Does it Mean for BIND Users, ISCThe DNS Root Zone Key-Signing Key is Changing, Mirjam Kühne, RIPE NCC

KSK Rollover Postponement

ICANN Postpones DNSSEC Root KSK Rollover – October 11 will NOT be the big day, Dan York, Internet SocietyKSK Rollover Postponed, ICANNRoot Zone KSK Rollover is Postponed, Duane Wessels, VeriSign, Inc.DNSSEC Key Rollover Delayed to Prevent Users Going Offline, Eduard Kovacs, SecurityWeekICANN’s internet DNS security upgrade apparently goes off without a glitch, Michael Cooney, Network World

转载于:https://www.cnblogs.com/sec875/articles/10028825.html

最新回复(0)