【DNS安全】攻击种类

研究的这几天,逐渐发现。如今,有些攻击名字变了,攻击手段不适用了。所以记清每一种不那么必要,见招拆招更有效。理论搞熟,再熟悉几个法则,ok了。

 

主要分为针对服务器和针对客户端

针对普通用户:有放大攻击,DNS重定向攻击,DNS劫持,中间人等
针对服务器,有缓存投毒,DNS cache snoop(可以用nmap实现),dns 欺骗(可以用cain,windnsspoof,dnsfucker等来实现),DDOS
 
重定向和劫持有相似的地方。重定向主要是利用手段将响应的地址换成其他的,是用户访问到别的地址。
缓存投毒:主要是把DNS server的缓存更新,with a wrong record。这种攻击可以利用related data,unrelated and DNS spoof作为攻击前奏。

DNS cache poisoning relates to an attack consisting of making a DNS server cache  false information: usually, a wrong record that will map a name to a “wrong” IP address. We will see that there are different ways for a hacker to do that, and that they are often related to DNS spoofing. With DNS cache poisoning, the hacker will try to make a DNS answer something he wants for a specific request. For instance, try to make the ns.defense.gov DNS to answer with the IP of the hacker’s computer to any query about the IP of telnetaccess.defense.gov.

DNS spoofing:DNS欺骗,是一个术语,专指伪造DNS响应欺骗客户端或者服务器。对应着两种攻击方向--客户端的ID Spoofing和服务器的Spoofing。可以参看http://hi.baidu.com/hacknone/blog/item/2aff9d5b7f0fd3262934f063.html 。 但是这种对付服务器的spoofing已经是老套的攻击方式了,现在由于存在bailiwick check(This just means that any records that aren't in the same domain of the question are ignored),所以已经失效了。

Kaminsky attack:只需要一台PC,边发请求,边发响应碰撞,响应包中包含同域名(为了bailiwick check)的auth信息和addition信息(错误的A地址)。如果碰撞成功,则更新server的记录。

 

你可能感兴趣的:(dns)