Unlimited WordPress themes, plugins & video downloads!

Research

Research – DNS Cache Poisoning Attack: Resurrections With Side Channels

In this paper, the authors conduct an analysis of the previously over-looked attack surface related to DNS, and are able to uncover even stronger side channels that have existed for over a decade in Linux kernels. The side channels affect not only Linux but also a wide range of DNS software running on top of it, including BIND, Unbound and dns-masq. They also discovered that about 38% of open resolvers (by frontend IPs) and 14% (by backend IPs) are vulnerable including the popular DNS services such as OpenDNS and Quad9.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/164989/ccs21_dns_poisoning.pdf

Source: https://packetstormsecurity.com/files/164989/DNS-Cache-Poisoning-Attack-Resurrections-With-Side-Channels.html

Related posts
Research

Research - EUSecWest 2012 Call For Papers

Research

Research - Examples Of Cross Site Scripting Tests

Research

Research - exploit_remote_fmtstring.txt

Research

Research - Exploiting Game Engines For Fun and Profit

Sign up for our Newsletter and
stay informed