Remote dns attack lab
Contents
- Overview
- Lab Tasks (Description)
- Suggested Time
- Files that are required
- Recommended Studying
- SML Movie: The Remote!
Overview
The goal of this lab is perfect for students to achieve the very first-hands experience
around the remote DNS cache poisoning attack, also known as the Kaminsky
DNS attack. DNS (Website Name System) may be the
Internet’s phonebook it
translates hostnames to IP addresses and the other way around.
This translation is thru DNS resolution, which happens behind
the scene.
DNS Pharming attacks manipulate this resolution process
in a variety of ways, by having an intent to misdirect users to
alternative destinations, that are frequently malicious.
This lab concentrates on a specific DNS Pharming attack technique, known as
DNS Cache Poisoning attack.
In another SEED Lab, we’ve designed activities to conduct the
same attack inside a local network atmosphere, i.e., the attacker and also the
victim DNS server are on a single network, where packet sniffering
can be done. Within this remote attack lab, packet sniffering isn’t
possible, therefore the attack becomes a lot more challenging than
the neighborhood attack.
Lab Tasks (Description)
- VM version: This lab continues to be tested on the pre-built
SEEDUbuntu16.04 VM.
Suggested Time
- Supervised situation (e.g. a carefully-led lab session): 4 hrs
- Without supervision situation (e.g. take-home project): 2 days
Files that are required
- Zone Files for DNS Setup
- Zone apply for domain example.com:
/var/cache/bind/example.com.db
- Default zone apply for DNS domain lookup:ns.dnslabattacker.internet:
/etc/bind/db.attacker
- Note: When you purchase different IP addresses or domains, you
have to customize the above configuration and zone files accordingly.
- Zone apply for domain example.com:
- The query packet generator sample program: You are able to download
udp.c came from here, but you have to modify the program.
Recommended Studying
- SEED Book (second Edition) by Wenliang Du
(Book website)
- Internet Security Software: A Hands-on Approach (Chapter 4)
- Computer & Internet Security Software: A Hands-on Approach (Chapter 18)
- D. Schneider.
Fresh Phish: The way a lately discovered flaw within the Internet’s
Website Name System allows scammers to lure you to definitely fake Internet sites.
IEEE Spectrum, 2008.
-
The Pharming Guide: Understanding & Stopping DNS-related Attacks by Phishers.
Resourse: https://seedsecuritylabs.org/Labs_16.04/Networking/DNS_Remote/