Author Topic: DNS Poisoning  (Read 1618 times)

Offline W1nTry

  • Administrator
  • Akatsuki
  • *****
  • Posts: 11329
  • Country: tt
  • Chakra 109
  • Referrals: 3
    • View Profile
  • CPU: Intel Core i7 3770
  • GPU: Gigabyte GTX 1070
  • RAM: 2x8GB HyperX DDR3 2166MHz
  • Broadband: FLOW
  • Steam: W1nTry
  • XBL: W1nTry
DNS Poisoning
« on: February 18, 2008, 09:47:33 AM »
To those that use Open DNS out on the world wibbly web (not OpenDNS persay) but others, here's an interesting read. Also in light of GATT's recent downtime and what I consider 'strange' redirection I think it's well worth a read by all our members:
Quote
DNS Inventor Warns of Next Big Threat
It's just a matter of time before a big breach occurs from corrupted DNS resolution, says Paul Mockapetris
FEBRUARY 11, 2008 | 5:10 PM

By Kelly Jackson Higgins
Senior Editor, Dark Reading

The industry is just one multi-million-dollar corporate data breach away from waking up to the serious and often-silent threat of corrupted DNS resolution servers, says DNS inventor Paul Mockapetris.

Mockapetris -- who is also chief scientist and chairman of the board for network naming and address vendor Nominum -- says the recent research on corrupted DNS resolution servers by researchers at Georgia Tech and Google demonstrates yet another way the bad guys are attacking DNS to infect users. (See Hacking a New DNS Attack .)

Researchers David Dagon, Chris Lee, and Wenke Lee of Georgia Tech, and Google's Niels Provos, dubbed the new threat "DNS resolution path corruption,” where malicious DNS servers provide false information in order to send users to malicious sites. The researchers officially presented their findings today at the Network and Distributed System Security Symposium (NDSS) in San Diego.

In their study of DNS resolution, they found around 17 million open-recursive DNS servers on the Net, and discovered that about .4 percent, or 68,000 of them, are performing malicious operations by answering DNS queries with false information that sends them to malicious sites. About 2 percent are returning suspicious results, they reported.

“This report demonstrates that people are getting lured out to dark alleyways of the Internet. The actual damage isn’t documented here, but it will be” somewhere when someone loses the first $10 million to $100 million to this type of attack, Mockapetris says.

This growing method of attack forces users to rely on rogue DNS servers, which results in what the researchers call a “second secret authority” on the Internet. They found dozens of viruses that infect DNS resolution paths, and that hundreds of URLs each week do drive-by alterations of host DNS settings.

There are obviously legitimate reasons for redirecting or “editing” a DNS entry/registry, such as with organizations like OpenDNS that block unwanted sites and correct fat-fingering mistakes from sending a user to a typo-squatter's site. But users need to be aware that the bad guys have also figured out how to abuse DNS this way, Mockapetris says.

So a user working off a public WiFi port, for example, is at the mercy of the DNS servers it uses, which "could easily be malicious," he says.

The Georgia Tech and Google researchers focused on malicious alteration of DNS answers in their study. “Companies are rewriting DNS answers, ideally to improve the user experience, but also to expose the users to ads,” says Georgia Tech’s Dagon. “There are also some laudable security improvements that come from rewriting answers. For example, OpenDNS can protect users from malicious sites. But DNS vendors aren't the only ones commercializing the alteration of DNS traffic. Malware authors also use this technique to exploit victims.”

Nominum’s Mockapetris says combating this threat may require revisiting the DNS “food chain” -- meaning “data from the user who owns the domain, to the user who wants to access it, and who gets to modify it,” he says. “The fewer places [it gets modified], the better.”

The researchers focused on incorrect and malicious answers provided by DNS machines, Dagon says. “The... alteration of DNS answers deserves further study. In service of that goal, we will make data from the ongoing study available to the research and DNS communities,” he says.

Carigamers

DNS Poisoning
« on: February 18, 2008, 09:47:33 AM »

Offline TriniXaeno

  • Administrator
  • Akatsuki
  • *****
  • Posts: 18836
  • Country: tt
  • Chakra 14
    • :ps3::wii::xbox360:
  • Referrals: 35
    • View Profile
    • http://www.carigamers.com
  • CPU: Intel Core i7-2600K
  • GPU: Geforce GTX 680 2GB
  • RAM: 16GB
  • Broadband: :flow:
  • MBL: Nexus 5x
  • PSN: TriniXaeno
  • XBL: TriniXaeno
Re: DNS Poisoning
« Reply #1 on: February 18, 2008, 11:52:04 AM »
Yeah, DNS is powerful mojo no doubt. Part of the internet's black magic backbone.

It's a double edged sword. I've seen where OpenDNS boasts that they block malicious sites via their servers.

Good raising awareness

Carigamers

Re: DNS Poisoning
« Reply #1 on: February 18, 2008, 11:52:04 AM »

 


* ShoutBox

Refresh History
  • Crimson609: yea everything cool how are you?
    August 10, 2022, 07:26:15 AM
  • Pain_Killer: Good day, what's going on with you guys? Is everything Ok?
    February 21, 2021, 05:30:10 PM
  • Crimson609: BOOM covid-19
    August 15, 2020, 01:07:30 PM
  • Shinsoo: bwda 2020 shoutboxing. omg we are in the future and in the past at the same time!
    March 03, 2020, 06:42:47 AM
  • TriniXjin: Watch Black Clover Everyone!
    February 01, 2020, 06:30:00 PM
  • Crimson609: lol
    February 01, 2020, 05:05:53 PM
  • Skitz: So fellas how we go include listing for all dem parts for pc on we profile but doh have any place for motherboard?
    January 24, 2020, 09:11:33 PM
  • Crimson609: :ph34r:
    January 20, 2019, 09:23:28 PM
  • Crimson609: Big up ya whole slef
    January 20, 2019, 09:23:17 PM
  • protomanex: Gyul like Link
    January 20, 2019, 09:23:14 PM
  • protomanex: Man like Kitana
    January 20, 2019, 09:22:39 PM
  • protomanex: Man like Chappy
    January 20, 2019, 09:21:53 PM
  • protomanex: Gyul Like Minato
    January 20, 2019, 09:21:48 PM
  • protomanex: Gyul like XJin
    January 20, 2019, 09:19:53 PM
  • protomanex: Shout out to man like Crimson
    January 20, 2019, 09:19:44 PM
  • Crimson609: shout out to gyal like Corbie Gonta
    January 20, 2019, 09:19:06 PM
  • cold_187: Why allur don't make a discord or something?
    December 03, 2018, 06:17:38 PM
  • Red Paradox: https://www.twitch.tv/flippay1985 everyday from 6:00pm
    May 29, 2018, 09:40:09 AM
  • Red Paradox: anyone play EA Sports UFC 3.. Looking for a challenge. PSN: Flippay1985 :)
    May 09, 2018, 11:00:52 PM
  • cold_187: @TriniXjin not really, I may have something they need (ssd/ram/mb etc.), hence why I also said "trade" ;)
    February 05, 2018, 10:22:14 AM

SimplePortal 2.3.3 © 2008-2010, SimplePortal