Главная
Study mode:
on
1
Introduction
2
About Jim
3
Agenda
4
What happens if you wait
5
An acquittal attack
6
Domain generation algorithms
7
Bad name queries
8
malformed packets
9
data exfiltration
10
DNS DDoS
11
DNS Natural Flood
12
F5 Load Balancing
13
F5 iRules
14
Putting the Pieces Together
15
GreatLog
16
Del
17
iRules
18
Critical Threat Notifications
19
DNS Hardening Overview
20
Log Interface
21
Quick Values
22
Network Operations Center
23
Span House List
24
Network compromised
25
DNS debug data
26
Geolocation
Description:
Explore DNS hardening techniques and proactive network security measures in this 26-minute conference talk from BSidesLV 2016. Delve into the use of F5 iRules and open-source analysis tools to combat various DNS-based threats. Learn about domain generation algorithms, bad name queries, malformed packets, data exfiltration, and DNS DDoS attacks. Discover how F5 Load Balancing and iRules can be leveraged to enhance security. Gain insights into critical threat notifications, DNS hardening overview, log interfaces, and geolocation. Understand the importance of quick response and the potential consequences of delayed action through real-world examples and case studies.

DNS Hardening - Proactive Network Security Using F5 iRules and Open Source Analysis Tools

BSidesLV
Add to list
0:00 / 0:00