Главная
Study mode:
on
1
Intro
2
Most Malware Uses DNS in Attacks
3
How DNS Is (Ab) Used: Finding a C&C Server
4
How DNS IS (Ab)Used: Tunneling
5
DNS Tunneling Example: Infiltration
6
Actual Photograph of Paul Publishing His Blog
7
Enter Response Policy Zones
8
How Response Policy Zones Work
9
Enter Passive DNS
10
Passive DNS Databases
11
Closing the Loop
12
Case Study: Farsight's NOD Feed
13
How to Apply What You've Learned Today
Description:
Explore how DNS servers can be transformed from security targets into powerful security tools in this 44-minute conference talk from RSA Conference. Learn about recent developments that allow for instrumenting DNS servers to implement policies based on domain name and IP address reputation, and utilize DNS telemetry to identify malicious patterns. Discover how malware exploits DNS throughout its lifecycle, understand the implementation of response policy zones for DNS resolution policies, and delve into passive DNS data collection and analytics. Gain insights into DNS tunneling, infiltration techniques, and real-world case studies. Apply this knowledge to enhance your organization's security posture by leveraging DNS as a proactive defense mechanism.

Turning DNS from Security Target into Security Tool

RSA Conference
Add to list
0:00 / 0:00