In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases?
The following list are the attack types from the first post, where DNSSEC can protect the users:
- DNS cache poisoning the DNS server, "Da Old way"
- DNS cache poisoning, "Da Kaminsky way"
- ISP hijack, for advertisement or spying purposes
- Captive portals
- Pentester hijacks DNS to test application via active man-in-the-middle
- Malicious attacker hijacks DNS via active MITM
The following list are the attack types from the first post, where DNSSEC cannot protect the users:
- Rogue DNS server set via malware
- Having access to the DNS admin panel and rewriting the IP
- ISP hijack, for advertisement or spying purposes
- Captive portals
- Pentester hijacks DNS to test application via active man-in-the-middle
- Malicious attacker hijacks DNS via active MITM
If you are a reader who thinks while reading, you might say "What the hell? Am I protected or not???". The problem is that it depends… In the case where the attacker is between you and your DNS server, the attacker can impersonate the DNS server, downgrade it to a non DNSSEC aware one, and send responses without DNSSEC information.
Now, how can I protect against all of these attacks? Answer is "simple":
- Configure your own DNSSEC aware server on your localhost, and use that as a resolver. This is pretty easy, even I was able to do it using tutorials.
- Don't let malware run on your system! ;-)
- Use at least two-factor authentication for admin access of your DNS admin panel.
- Use a registry lock (details in part 1).
- Use a DNSSEC aware OS.
- Use DNSSEC protected websites.
- There is a need for an API or something, where the client can enforce DNSSEC protected answers. In case the answer is not protected with DNSSEC, the connection can not be established.
Now some random facts, thoughts, solutions around DNSSEC:
- Did you know .SE signed its zone with DNSSEC in September 2005, as the first TLD in the world?
- Did you know DNSSEC was first deployed at the root level on July 15, 2010?
- Did you know .NL become the first TLD to pass 1 million DNSSEC-signed domain names?
- Did you know that Hungary is in the testing phase of DNSSEC (watch out, it is Hungarian)?
- Did you know that you can also use and test that cool DNSSEC validator?
- Did you know that there are alternative solutions like DNSCrypt?
- Did you know that in the future you might be able to enforce HSTS via DNSSEC?
- Did you know that in the future you might be able to use certificate pinning via DNSSEC?
Note from David:
Huh, I have just accidentally deleted this whole post from Z, but then I got it back from my browsing cache. Big up to Nir Sofer for his ChromeCacheView tool! Saved my ass from kickin'! :D
Related news- Pentest Tools Android
- Pentest Recon Tools
- Pentest Tools Framework
- Nsa Hacker Tools
- Hacker Tools Free Download
- Hack App
- Pentest Tools Tcp Port Scanner
- Hack Tools Download
- Hack Tools For Windows
- Usb Pentest Tools
- Hack And Tools
- Github Hacking Tools
- Pentest Tools For Ubuntu
- Bluetooth Hacking Tools Kali
- Hacker Search Tools
- Hacker Tools For Mac
- Top Pentest Tools
- Pentest Tools Open Source
- Hacking Tools Usb
- Beginner Hacker Tools
- Hacking Tools Pc
- Hacker Tools For Windows
- Tools 4 Hack
- Beginner Hacker Tools
- What Are Hacking Tools
- Hack Tools Online
- Hack Tools
- Hacking Tools For Mac
- Pentest Tools For Android
- Hacking Tools For Windows
- Pentest Tools Framework
- Free Pentest Tools For Windows
- What Is Hacking Tools
- Pentest Tools
- Hacker Tools Free
- Hack Tools For Ubuntu
- Hackers Toolbox
- Hacker Tool Kit
- Best Hacking Tools 2020
- Pentest Tools Bluekeep
- Pentest Tools Nmap
- Nsa Hack Tools
- Computer Hacker
- Pentest Tools Free
- Hacking Tools Windows
- Hacking Tools Download
- Underground Hacker Sites
- Hack Rom Tools
- Install Pentest Tools Ubuntu
- Hacking Apps
- Hacker Tools For Pc
- Pentest Tools For Android
- Hack Tool Apk No Root
- Hacker Search Tools
- Pentest Recon Tools
- Hacker Tools Software
- Hacker Tools List
- Hack Tools
- Pentest Tools For Ubuntu
- Hackrf Tools
- Black Hat Hacker Tools
- Pentest Tools Website Vulnerability
- Bluetooth Hacking Tools Kali
- Hack App
- Usb Pentest Tools
- Hacker Tools List
- Pentest Tools Kali Linux
- Hacking Tools 2019
- New Hack Tools
- Hacking Tools Hardware
- What Are Hacking Tools
- Github Hacking Tools
- Hack Tools For Mac
- Hacking Tools
- Nsa Hacker Tools
- Tools 4 Hack
- Hak5 Tools
- Pentest Tools Kali Linux
- Hacker Tools List
- Pentest Tools For Windows
- Ethical Hacker Tools
- Hacking Tools For Games
- Hacker Tools Free
- Tools 4 Hack
- Usb Pentest Tools
- Pentest Tools Android
- Easy Hack Tools
- Hak5 Tools
- Pentest Tools Download
- Nsa Hack Tools
- Blackhat Hacker Tools
- Pentest Recon Tools
- Hackrf Tools
- Hack Tool Apk
- Easy Hack Tools
- Hacker Tools 2020
- Hack Tools Online
- Pentest Tools Online
- Pentest Tools Free
- Hack App
- Pentest Tools Website
- Hack Tool Apk No Root
- Hacker Tools Hardware
- Hacking App
- Pentest Tools For Windows
- How To Install Pentest Tools In Ubuntu
- World No 1 Hacker Software
- Hacking Tools Hardware
- Hackers Toolbox
- Wifi Hacker Tools For Windows
- Physical Pentest Tools
- Wifi Hacker Tools For Windows
- Hack Tools 2019
- Pentest Tools Android
- Pentest Tools Kali Linux
- Free Pentest Tools For Windows
- Hack Tools For Pc
- Tools 4 Hack
- Beginner Hacker Tools
- Hacking Tools And Software
- Physical Pentest Tools
- Hacker
- Hacking Tools Software
- Hacker Tools Apk Download
- Hacking Tools For Beginners
- Hack Apps
- Hacker Tool Kit
- Hacker Tools 2020
- Pentest Tools Find Subdomains
- Hacking Tools Pc
- Hacker Tools Apk Download
- Pentest Tools Linux
- Hack Website Online Tool
- Pentest Tools Subdomain
- Hacker Tools Online
- Pentest Tools For Android
- What Are Hacking Tools
- Pentest Tools Bluekeep
No hay comentarios:
Publicar un comentario