Главная
Study mode:
on
1
Introduction
2
Why DNS as a Service
3
Route 53
4
How DNS Works
5
R53
6
Withio
7
Example
8
Testing
9
Initial Analysis
10
What is Dynamic DNS
11
Microsofts Algorithm
12
What Did We Learn
13
NationState Intelligence
14
IBBased Intelligence
15
Computer Names
16
ipv6 addresses
17
The scope
18
Timeline disclosure
19
Blocking the attack
20
Misconfiguration
21
Registration
22
Primary Name Server
23
Research Directions
24
Dynamic DNS
25
Summary
Description:
Explore a groundbreaking presentation on a novel class of DNS vulnerabilities affecting multiple DNS-as-a-Service (DNSaaS) providers, including major cloud platforms like AWS Route 53. Delve into the technical details of these vulnerabilities, which can potentially lead to the exfiltration of sensitive information from corporate networks, such as internal and external IP addresses, computer names, and even NTLM/Kerberos tickets. Understand the root cause of the problem, stemming from non-standard DNS resolver implementations and specific edge cases on the service provider's side. Learn about the research methodology, testing procedures, and initial analysis that led to the discovery of these vulnerabilities. Gain insights into the potential impact on national security and intelligence gathering. Examine the timeline of disclosure, mitigation strategies, and steps to block such attacks. Investigate the scope of affected services, misconfiguration issues, and registration processes. Conclude with an exploration of future research directions in dynamic DNS and a comprehensive summary of the findings. Read more

A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms

Black Hat
Add to list
0:00 / 0:00