Page 780 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 780

responds. Once the client receives the response from the rogue DNS

               server, the client closes the DNS query session, which causes the
               response from the real DNS server to be dropped and ignored as an
               out-of-session packet.

               DNS queries are not authenticated, but they do contain a 16-bit value
               known as the query ID (QID). The DNS response must include the
               same QID as the query to be accepted. Thus, a rogue DNS server must
               include the requesting QID in the false reply.

               Perform DNS poisoning. DNS poisoning involves attacking the
               real DNS server and placing incorrect information into its zone file.

               This causes the real DNS server to send false data back to clients.

               Alter the HOSTS file. Modifying the HOSTS file on the client by
               placing false DNS data into it redirects users to false locations.

               Corrupt the IP configuration. Corrupting the IP configuration can
               result in a client having a false DNS server definition. This can be
               accomplished either directly on the client or on the network’s DHCP

               server.

               Use proxy falsification. This method works only against web
               communications. This attack plants false web proxy data into a client’s
               browser, and then the attacker operates the rogue proxy server. A
               rogue proxy server can modify HTTP traffic packets to reroute
               requests to whatever site the hacker wants.

               Although there are many DNS poisoning methods, here are some basic
               security measures you can take that can greatly reduce their threat:


                    Limit zone transfers from internal DNS servers to external DNS
                    servers. This is accomplished by blocking inbound TCP port 53
                    (zone transfer requests) and UDP port 53 (queries).

                    Limit the external DNS servers from which internal DNS servers
                    pull zone transfers.

                    Deploy a network intrusion detection system (NIDS) to watch for
                    abnormal DNS traffic.


                    Properly harden all DNS, server, and client systems in your private
                    network.
   775   776   777   778   779   780   781   782   783   784   785