In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases?
The following list are the attack types from the first post, where DNSSEC can protect the users:
- DNS cache poisoning the DNS server, "Da Old way"
- DNS cache poisoning, "Da Kaminsky way"
- ISP hijack, for advertisement or spying purposes
- Captive portals
- Pentester hijacks DNS to test application via active man-in-the-middle
- Malicious attacker hijacks DNS via active MITM
The following list are the attack types from the first post, where DNSSEC cannot protect the users:
- Rogue DNS server set via malware
- Having access to the DNS admin panel and rewriting the IP
- ISP hijack, for advertisement or spying purposes
- Captive portals
- Pentester hijacks DNS to test application via active man-in-the-middle
- Malicious attacker hijacks DNS via active MITM
If you are a reader who thinks while reading, you might say "What the hell? Am I protected or not???". The problem is that it depends… In the case where the attacker is between you and your DNS server, the attacker can impersonate the DNS server, downgrade it to a non DNSSEC aware one, and send responses without DNSSEC information.
Now, how can I protect against all of these attacks? Answer is "simple":
- Configure your own DNSSEC aware server on your localhost, and use that as a resolver. This is pretty easy, even I was able to do it using tutorials.
- Don't let malware run on your system! ;-)
- Use at least two-factor authentication for admin access of your DNS admin panel.
- Use a registry lock (details in part 1).
- Use a DNSSEC aware OS.
- Use DNSSEC protected websites.
- There is a need for an API or something, where the client can enforce DNSSEC protected answers. In case the answer is not protected with DNSSEC, the connection can not be established.
Now some random facts, thoughts, solutions around DNSSEC:
- Did you know .SE signed its zone with DNSSEC in September 2005, as the first TLD in the world?
- Did you know DNSSEC was first deployed at the root level on July 15, 2010?
- Did you know .NL become the first TLD to pass 1 million DNSSEC-signed domain names?
- Did you know that Hungary is in the testing phase of DNSSEC (watch out, it is Hungarian)?
- Did you know that you can also use and test that cool DNSSEC validator?
- Did you know that there are alternative solutions like DNSCrypt?
- Did you know that in the future you might be able to enforce HSTS via DNSSEC?
- Did you know that in the future you might be able to use certificate pinning via DNSSEC?
Note from David:
Huh, I have just accidentally deleted this whole post from Z, but then I got it back from my browsing cache. Big up to Nir Sofer for his ChromeCacheView tool! Saved my ass from kickin'! :D
Related articles- Pentest Tools Find Subdomains
- Pentest Tools For Windows
- Hacking Tools Windows 10
- Computer Hacker
- Hack Tools Online
- Hacking Tools Windows 10
- Hacker
- Pentest Recon Tools
- Hacking Tools
- Usb Pentest Tools
- Hacker Tools List
- Hacker Tools Apk
- Hacking Tools Windows
- Hacking Tools Download
- Hacker Tools Free
- Pentest Tools Windows
- Hack Tools Pc
- Pentest Tools For Mac
- Hacking App
- Best Hacking Tools 2019
- Pentest Tools Windows
- Pentest Tools Open Source
- Hacking Tools Windows
- Hack Tools Pc
- Hacker Tools Apk
- Top Pentest Tools
- Hacking Tools For Windows
- Hacking Tools Github
- Hacker Tools
- Pentest Tools
- Hacker
- Hack Tools Pc
- Hak5 Tools
- Hack Tools Mac
- How To Hack
- Growth Hacker Tools
- Nsa Hacker Tools
- Hacker Tools Free
- Hacker Tools Apk Download
- Pentest Tools For Ubuntu
- Underground Hacker Sites
- Hacking Tools And Software
- Nsa Hacker Tools
- Pentest Tools Apk
- Hacker Tools For Ios
- Underground Hacker Sites
- Pentest Reporting Tools
- Hack Tools Github
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Github
- Hacking Tools Hardware
- Usb Pentest Tools
- Pentest Box Tools Download
- Hacking Tools Github
- Underground Hacker Sites
- Hacking Tools Pc
- How To Make Hacking Tools
- Pentest Tools Windows
- Hacking Tools Pc
- Hacking Tools For Pc
- Hack Rom Tools
- Hacking App
- Beginner Hacker Tools
- Pentest Tools Windows
- Hacking Tools And Software
- Hack Tools Download
- Hack Apps
- Underground Hacker Sites
- How To Hack
- Top Pentest Tools
- How To Make Hacking Tools
- Hacker Tools Hardware
- Hacker Tools Apk Download
- Hackrf Tools
- Pentest Tools Bluekeep
- Pentest Tools Nmap
- Pentest Tools Website Vulnerability
- Hackrf Tools
- Pentest Tools Port Scanner
- Hacking Tools For Beginners
- Hacking Tools Download
- Beginner Hacker Tools
- Nsa Hack Tools Download
- Computer Hacker
- Hacking Tools For Beginners
- Growth Hacker Tools
- Pentest Tools Kali Linux
- Hacking Tools Kit
- Pentest Tools Subdomain
- Underground Hacker Sites
- What Are Hacking Tools
- Best Hacking Tools 2020
- Hacking Tools
- Pentest Box Tools Download
- Pentest Reporting Tools
- Pentest Tools Framework
- Pentest Tools Subdomain
- Hack And Tools
- New Hacker Tools
- Hacker Tools Hardware
- Hackrf Tools
- Hacking Tools Software
- Hack Tools Mac
- Hacking Tools And Software
- Hack And Tools
- Pentest Recon Tools
- Pentest Tools Port Scanner
- Blackhat Hacker Tools
0 comments: on "DNSSEC, From An End-User Perspective, Part 3"
Post a Comment