Главная
Study mode:
on
1
Intro
2
Objectives
3
Threat Analysis Methodology
4
Introduction
5
In a nutshell...
6
mDNS: A few more details...
7
and a few words for DNS-SD
8
What's the Inherent Problem(s)
9
Related Work
10
Types of Attacks
11
Discovery of available services
12
A Special Service
13
Discovering Instances of a Specific Service • Query for a DNS PTR record with a name of
14
Information Gathering
15
How Pholus Automates Reconnaissance
16
Advertised DNS Reverse Mapping
17
Implicit Network Sweeping
18
Spoofing Services Manually
19
Spoofing TXT ans SRV Records
20
Send Automatically Fake Responses
21
An Asymmetric Key Verification Example
22
Spoofing-Related Options
23
and What About TXT Records?
24
How to Reproduce Overflow Attempts
25
Is there Room for DNS Cache Poisoning?
26
Denial of Service Setting DNS TTL:=0
27
Setting DNS TTL=0 Using Pholus
28
Probing
29
Denial of Service + Net Flooding Creating Conflicts deliberately
30
Other Dos Capabilities
31
Generic Flooding of a Network
32
Direct Unicast Queries
33
DDoS (Amplification) Attack
34
Situation Nowadays
35
Sometimes Problems re-appear...
36
How to Reproduce the Attacks Using Pholus?
37
Mitigation?
38
Permanent Fix?
39
Conclusions
40
References
41
Questions?
Description:
Explore an in-depth analysis of Multicast DNS and DNS Service Discovery protocols in this conference talk from Hack In The Box Security Conference. Delve into the inherent weaknesses of these Zero Configuration Networking protocols, including their generous broadcasting of information and use of easily spoofable messages. Examine the complete threat analysis and potential attack vectors against popular devices, implementations, and operating systems in both IPv4 and IPv6 environments. Learn about the specially developed tool used for testing and the implications of using these protocols in non-cooperative environments. Discover various attack types, including service discovery, information gathering, spoofing, denial of service, and DDoS amplification. Gain insights into the current state of these protocols, recurring problems, and potential mitigation strategies. Benefit from the expertise of Dr. Antonios Atlasis, an IT Security engineer and researcher specializing in network protocol analysis, attacks, and mitigations. Read more

In Depth Analysis of Multicast DNS and DNS Service Discovery

Hack In The Box Security Conference
Add to list
0:00 / 0:00