Results 1 to 6 of 6

Thread: What are the different threats on DNS

  1. #1
    Join Date
    May 2009
    Posts
    1,010

    What are the different threats on DNS

    I need factor causing the problem of DNS security. What all options are depend on it. I want some information on different types of DNS attacks and security threats on it. Which is the most common one that is affecting a DNS security most oftenly. what are the precaution measure used to troubleshoot out this problem online. There might be many means of way.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: What are the different threats on DNS

    Of all malevolent attacks, DNS is most susceptible to spoofing. When any DNS resolver sends a inaccessible inquiry, it tags the inquiry with a 16-bit transaction ID ( XID) value in the DNS packet header and anticipate that the inaccessible DNS server will respond on the same port with the same XID value. The inquiry is characteristically sent over UDP. TCP is used only after a UDP response has been truncated.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: What are the different threats on DNS

    When the resolver take delivery of a UDP DNS reaction, it can only weakly confirm that the reaction is genuine by matching these limitations. Like for example the first is, inaccessible DNS server address. This check is often put out of action by failure to pay because many network devices make it come into view that valid responses come from an address different from the one the query was sent to. This makes the spoofing of a DNS response even easier.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: What are the different threats on DNS

    Port on which the packet was established. The resolver will characteristically send from an momentary port to port 53. DNS servers take action from port 53 to the foundation port used by the supplicant. The port value is often easy for a malevolent user to guess. Packet XID value. The XID value is set in the request by the resolver and must be matched in the response.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: What are the different threats on DNS

    The different threats on DNS is a powerfully unsystematic value can and should be used for the XID, but it is only 16 bits long. The XID value, like the rest of the DNS packet, is sent in the clear. Query name and type. The DNS server repeats the query name and type in the question section of the DNS reaction.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: What are the different threats on DNS

    If a malevolent user does not have right to use to a DNS client or server’s network traffic, he might be able to guess that a DNS client or server has sent a DNS query and is waiting for a DNS reaction. When he has resolute this to be true, the attacker can send one or more spoofed DNS reaction packets and endeavor to beat the authentic response back to the requester.

Similar Threads

  1. Types of DNS security threats
    By Santiaago in forum Networking & Security
    Replies: 5
    Last Post: 09-02-2010, 12:17 PM
  2. What are the top threats of 2010
    By Cruzz in forum Networking & Security
    Replies: 5
    Last Post: 06-01-2010, 01:51 AM
  3. What are new types of threats
    By CACTUS101 in forum Networking & Security
    Replies: 3
    Last Post: 19-11-2009, 04:50 AM
  4. web server Threats?
    By Conrad in forum Networking & Security
    Replies: 3
    Last Post: 25-10-2008, 01:59 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,714,133,819.45421 seconds with 17 queries