Page 779 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 779

Further Reading on DNS



                  For an excellent primer to advanced discussion on DNS, its
                  operation, known issues, and the Dan Kaminsky vulnerability,
                  please visit “An Illustrated Guide to the Kaminsky DNS
                  Vulnerability”:

                  http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html

                  For a look into the future of DNS, specifically the defense against
                  the Kaminsky vulnerability, visit www.dnssec.net.




               DNS Poisoning

               DNS poisoning is the act of falsifying the DNS information used by a

               client to reach a desired system. It can take place in many ways.
               Whenever a client needs to resolve a DNS name into an IP address, it
               may go through the following process:

                1.  Check the local cache (which includes content from the HOSTS
                    file).

                2.  Send a DNS query to a known DNS server.

                3.  Send a broadcast query to any possible local subnet DNS server.
                    (This step isn’t widely supported.)

               If the client doesn’t obtain a DNS-to-IP resolution from any of these

               steps, the resolution fails, and the communication can’t be sent. DNS
               poisoning can take place at any of these steps, but the easiest way is to
               corrupt the HOSTS file or the DNS server query.

               There are many ways to attack or exploit DNS. An attacker might use
               one of these techniques:

               Deploy a rogue DNS server (also known as DNS spoofing or

               DNS pharming). A rogue DNS server can listen in on network
               traffic for any DNS query or specific DNS queries related to a target
               site. Then the rogue DNS server sends a DNS response to the client
               with false IP information. This attack requires that the rogue DNS
               server get its response back to the client before the real DNS server
   774   775   776   777   778   779   780   781   782   783   784