Главная
Study mode:
on
1
Intro
2
You know the drill...
3
Things I'm going to talk about
4
Request types
5
The scenario...
6
Cross-site scripting in logs?
7
SQL Injection
8
Interesting sidenote... Gopher!
9
Shell injection - result?
10
DNS Re-binding summary
11
The protocol
12
Traffic forwarding
13
Shellcode (aka, exploit payload)
14
Detection
Description:
Explore the intricacies of DNS security in this 48-minute conference talk from DerbyCon 4. Delve into various DNS request types, cross-site scripting vulnerabilities in logs, SQL injection techniques, and the often-overlooked Gopher protocol. Examine the potential risks of shell injection and gain insights into DNS rebinding attacks. Analyze the DNS protocol, traffic forwarding methods, and shellcode payloads. Learn to detect and mitigate these threats to enhance your network's security posture.

Secrets of DNS

Add to list
0:00 / 0:00