Главная
Study mode:
on
1
Intro
2
DOMAIN NAME SYSTEM Operation, Threats, and Security Intelligence
3
AMPLIFICATION ATTACK PROCESS
4
PROPER DNS SERVER CONFIGURATION
5
YOU ARE NOT AN ISP Unless, of course, you are ONLY PROVIDE RESPONSES FOR DOMAINS YOU OWN
6
BLIND TRANSFERS ARE BAD
7
DOMAIN HIJACKING
8
HOW DO WE STOP THIS?
9
DNS SECURITY USE CASES
10
SSL TRAFFIC CORRELATION Problem Reading encyrpted requests is hard
11
THREAT INTELLIGENCE USING DNS DATA DNS lookups for known malicious sites Hosting providers associated with ransomware
12
FORENSIC INVESTIGATIONS
13
DNS DATA EXFILTRATION Detect DNS tunneling - abnormally high number of lookups for a single domain
14
THREAT INTELLIGENCE RESEARCH
Description:
Explore the intricacies of the Domain Name System (DNS) in this 36-minute conference talk from Louisville InfoSec 2016. Delve into DNS operation, potential threats, and security intelligence with expert Tom Kopchak. Learn about amplification attack processes, proper DNS server configuration, and the importance of only providing responses for domains you own. Discover the dangers of blind transfers and domain hijacking, and explore effective countermeasures. Examine DNS security use cases, including SSL traffic correlation challenges and threat intelligence using DNS data. Gain insights into forensic investigations, DNS data exfiltration detection, and the role of DNS in threat intelligence research. Enhance your understanding of DNS security to better protect your organization's digital infrastructure.

The Domain Name System - DNS Operation, Threats, and Security Intelligence

Add to list