Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls
DNS tunneling is a hacking technique that hides information by taking advantage of the DNS protocol. This attack enables threat actors to evade firewalls and security measures.
Hackers retrieve information usually encoded in DNS queries...
DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC
The communication between DNS recursive resolvers and authoritative nameservers is largely unsecured, making it susceptible to on-path and off-path attacks.
Though many security proposals have been put forward, they often face implementation challenges or lack...
Sitting Ducks DNS Attack Hijack 35,000 Domains
Threat actors have been exploiting the attack vector known as Sitting Ducks since at least 2019 to conduct malware delivery, phishing, brand impersonation, and data exfiltration by exploiting flaws in DNS.
This widespread flaw, affecting...
BIND DNS Vulnerability Lets Attackers Flood Server With DNS Messages
The Internet Systems Consortium (ISC) has released critical security advisories addressing multiple vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 software, a cornerstone of the Domain Name System (DNS) infrastructure.
These vulnerabilities, identified as...
New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses
Cybersecurity researchers have unveiled a new and potent Denial of Service (DoS) attack, dubbed "DNSBomb."
This attack leverages the inherent mechanisms of the Domain Name System (DNS) to create a powerful pulsing DoS attack...
Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication
Hackers exploit DNS vulnerabilities to redirect users to malicious websites, launch distributed denial-of-service (DDoS) attacks by overwhelming DNS servers, and manipulate domain resolutions to intercept traffic for surveillance or data theft purposes.
Infoblox researchers recently...
DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters
A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly.
The tool, DNS-Tunnel-Keylogger, was designed for...
10 Dangerous DNS Attacks Types & Prevention Measures – 2024
Our topic for today seems to be centered around the most common 10 DNS attacks and how to effectively mitigate them. We'll dive into the details of each attack, their potential impact, and recommended...
DNS Analyzer: A New Burp Suite Extension to Find DNS Flaws in Web Apps
DNS flaws are very common on web applications where the DNS resolvers are vulnerable to Kaminsky attacks.
If threat actors are able to predict portions of a DNS query and the source ports, they...
Top 11 Best DNS Filtering Solutions – 2024
Before you know about DNS Filtering Solutions, you need to understand that it is a concept that comes in the first place.
In this digital world, cybersecurity is essential, and this is a big...