Question

1) Prepare a technical report on DNS services its functions, benefits and cconfigurations. 2) Evaluate the...

1) Prepare a technical report on DNS services its functions, benefits and cconfigurations.

2) Evaluate the security risk associated with DNS services and document the hardening parameters to secure DNS servers.

Note: For task 2, Identify various attacks on DNS services

Homework Answers

Answer #1

What is DNS?

Domain Name System is a decentralized hierarchical naming system for server, a computer which are either publicly available or within a private, internal network by associates a domain name to a place to find content for that domain in the form of converting the name into machine readable.

DNS Function

DNS has two major parts: a Nameserver and the DNS Records. The nameserver stores the information as a reference number for the DNS Records. When a computer browser makes its request for a domain, the Nameserver it uses provides a location to find details about the DNS Records. DNS Record is what actually converts a URL into an IP Address.

For example, if someone enters yahoo.com into a browser. The browser reaches out to the root nameservers for any .com domain names from Verisign (the root) and finds the nameserver for Yahoo.com. That nameserver is ns3.yahoo.com. Now, that nameserver points you to the DNS Manager for the domain, Yahoo.com. Upon checking, the DNS Manager provides 27.123.42.42 as the DNS Record for yahoo.com. The browser then lands at the above IP Address showing yahoo.com’s site content.

DNS Services

Authoritative DNS: An authoritative DNS service is an update mechanism service where developers use to manage their public DNS names. It gives the services like answers DNS queries, translating domain names into IP address so computers can communicate with each other. This service responsible for providing answers to recursive DNS servers with the IP address information with final authority over a domain.

Recursive DNS: A recursive DNS service acts like a hotel concierge: while it doesn't own any DNS records, it acts as an intermediary who can get the DNS information on your behalf. If a recursive DNS has the DNS reference cached or stored for a period of time, then it answers the DNS query by providing the source or IP information. If not, it passes the query to one or more authoritative DNS servers to find the information. Clients typically do not make queries directly to authoritative DNS services. Instead, they generally connect to another type of DNS service known a resolver, or a recursive DNS service.

Benefits

Maintenance of All the content through names in order for fats access.

Security enhancement where it protects the tons of sensitive data

It allows having primary and secondary connections that have internet uptime of any one server which is down for maintenance.

Fault tolerance and web hosting's proper load distribution to multiple servers enable the multiple hostnames corresponding to a single IP address.

Secure , reliable and faster online content transactions

DNS Configurations:-

The System is configured by default to use the host of each computer in servers .Even though ,if it need to configure and use DNS instead if;

  • The network is large and regularly adds and deletes hosts.
  • The network is connected it internet is connected which will convenient for configure.
  • Which s DHCP (Dynamic Host Configuration Protocol )

For example if we need to configure the DNS for Google ,Then in Windows

  • Press the Control panel for network and internet seetings.
  • Then in that,adapter settings will have the properties to change the address where the number for IP+v4 is 8.8.8.8 or 8.8.4.4

2 question

There are many attacks which happened to DNS due to weak firewalls where the port are open and cause the system hacked.and leads loss of revenue ,customer defectoion and negative brand impact if it consider for business DNS.These are some attacks in DNS:-

a) Distributed Reflection DoS attack

•Combines Reflection and Amplification by attacker sending spoofed queries to the open recursive servers.

•Uses third-party open resolvers in the Internet (unwitting accomplice) for making Queries specially crafted to result for making  very large response.

Impact:

•Causes DDoS on the victim’s server

b) Cache poisoning

Corruption of the DNS cache data

  • Attacker queries with a  recursive name server for IP address of a malicious site which  provides requested rogue IP address and also maps he rogue IP address to additional legitimate sites .

Impact:

Confidential information of the user like Logins, passwords, credit card numbers of can be captured .

c) TCP SYN floods

•These half-opened connections exhaust memory on the server

•Uses the 3-way handshake that begins a TCP connection

•Attacker sends spoofed SYN packets with the source IP address of bogus destinations

•The server sends SYN-ACKs to these bogus destinations

•It never receives acknowledgement back from these destinations and the connections are never completed.

Impact

•Server stops responding to new connection requests coming from legitimate users

d) DNS tunneling

•Uses DNS as a covert communication channel to bypass firewal using  protocols like SSH, TCP or Web within DNS.

•Enables attackers to easily pass stolen data or tunnel IP traffic without detection using DNS tunnel for remote access.

Impact:

•Data exfiltration can happen through the tunnel..

DNS hijacking

•Modifies DNS record settings (most often at the domain registrar) to point to a rogue DNS server or domain.

•User tries to access a legitimate website www.mybank.com

•User gets redirected to bogus site controlled by hackers that looks a lot like the real thing.

Impact

•Hackers acquire user names, passwords and credit card information.

Basic NXDOMAIN attack

•The attacker sends a flood of queries to a DNS server to resolve a non-existent domain/domain name.

•The recursive server tries to locate this non-existing domain by carrying out multiple domain name queries but does not find it.

•In the process, its cache is filled up with NXDOMAIN results.

Impact:

•Slower DNS server response time for legitimate requests

•DNS server also spends valuable resources as it keeps trying to repeat the recursive query to get a resolution result.

Phantom Domain attack

•“Phantom” domains are setup as part of attack

•DNS resolver tries to resolve multiple domains that are phantom domains

•These phantom domains may not send responses or they will be slow

Impact

•Server consumes resources while waiting for responses, eventually leading to degraded performance or failure

•Too many outstanding queries

DNS Hardeing Methods:-

1) Audit the DNS zones

Exploring all the DNS public records using SecurityTrails by review all the  zones, records and IPs by  testing the domain names or subdomains that sometimes run outdated software or unrestricted areas which are vulnerable to attack.

2) Keep the  DNS servers up-to-date

Running the user name servers gives the ability to configure using thrid party software which will prevent service exploits targeting bugs and vunerabilities.

Restrict Zone Transfers

DNS servers are allowed to perform a zone transfer, or at least limit the allowed IP addresses that can make such requests.the used by slave name servers to query master DNS servers for network topology.

Disable DNS recursion to prevent DNS poisoning attacks

DNS recursion is enabled by default  on all major Linux distributions, and this can lead to serious security issues, like DNS poisoning attacks which  spoofing attack happens in the middle, providing information to a DNS server that wasn't the one from authoritative DNS sources..

Two-Factor Authentication

n order to avoid a DNS zone compromise: set up a two-factor authentication protection on DNS server provider using third party software or google SMS verification as a representational example for more secure.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
1. How is a technical report different from a news report? Mention their differences. 2. Download...
1. How is a technical report different from a news report? Mention their differences. 2. Download a research paper of your choice; read its Executive Summary/Abstract thoroughly and attempt the questions given below. Please note that each one of you should find a research paper on your own. If two students work on the same research paper, that shall be considered plagiarism. Also, if the summary/abstract is already composed with headings, don’t use it. a. Identify different parts of the...
1. SoCal Movie Company produces movies at a studio in Southern California. The risk manager decided...
1. SoCal Movie Company produces movies at a studio in Southern California. The risk manager decided to identify the range of potential consequences associated with various risks that the company faces. For example, if a severe earthquake occurred while the company was filming a movie, there could be deaths and injuries, destruction of movie sets, delays in production, costs associated with filming at an alternative location, and loss of reputation and good will. The type of analysis performed by the...
A newly developed hospital requires an Electronic Decision Support System (DSS) for clinicians. This DSS is...
A newly developed hospital requires an Electronic Decision Support System (DSS) for clinicians. This DSS is required to have all the necessary features to help the practice. Develop a Software Requirements Specification (SRS) document that identifies all the necessary requirements for the system. This document must strictly follow the IEEE template uploaded on canvas. However, there may be sections in the template that may not apply to the project, these sections can be eliminated. Use the template below to answer...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees with an annual revenue of $10 million. It has approximately 1000 customers comprising of private individuals and small companies. FinTechCo’s mission is to provide financial services and advice to its clients, to sell various products and services and offer consultation guidance regarding the information systems that support them. Problem Statement FinTechCo’s technical team were originally qualified financial planners who transitioned into technical roles and...
1-25 True or False 1. Sales revenue is an inflow of assets. 2. The three distinct...
1-25 True or False 1. Sales revenue is an inflow of assets. 2. The three distinct types of cost to a manufacturer are direct materials, direct labor, and manufacturing overhead.                       3. Sales Returns and Allowances is a contra-asset account. 4. Like sales revenue, cost of goods sold represents an inflow of assets. 5. With the periodic inventory system the inventory account is updated after each sale or purchase. 6. When merchandise is sold FOB shipping point, the buyer is responsible...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas competitors....
In a bizarre twist to a bizarre story, on October 22, 2013, Deloitte agreed to pay...
In a bizarre twist to a bizarre story, on October 22, 2013, Deloitte agreed to pay a $2 million penalty to settle civil charges—brought by the PCAOB—that the firm violated federal audit rules by allowing its former partner to continue participating in the firm’s public company audit practice, even though he had been suspended over other rule violations. The former partner, Christopher Anderson, settled with the PCAOB in 2008 by agreeing to a $25,000 fine and a one-year suspension for...
Please answer this question in short essay form (2-4 paragraphs) Considering that cultures as complicated and...
Please answer this question in short essay form (2-4 paragraphs) Considering that cultures as complicated and socially constructed through the communicative interaction of organizational members. Briefly describe how the organizational concepts of complicated, emergent, unitary, and ambiguous apply to the sample auto-ethnography. Sample Auto-ethnography: Required Reading Auto-ethnography of College X Joe Student Organizational Culture and Diversity 223-58000 “The organization’s culture has both a direct and an indirect impact on the allocation of power among diverse groups. The values and ideologies...
Please review the following below and provide , one-page reaction to this budget proposal. 1. Budget...
Please review the following below and provide , one-page reaction to this budget proposal. 1. Budget The President’s Budget and Health Care While the president’s budget is not likely to be acted upon by Congress, it does signal what the administration’s priorities are—as well as what policy initiatives they might push. Repeal the Affordable Care Act: The administration’s budget includes a plan that is based upon the plan put forward by Sens. Lindsey Graham (R-SC) and Bill Cassidy (R-LA) last...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT