Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Common DDOS attacks     - TOAST function in PostgreSQL (Database)

- Ubuntu Linux to create and increase the Swap partition tutorial (Linux)

- iOS GCD multithreading simple to use (Programming)

- CentOS and RHEL to install IPython 0.11 (Linux)

- To setup a ftp server under Linux (Server)

- How dependent on Fedora, CentOS, RHEL check RPM packages (Linux)

- Use Aptik Battery Monitor monitoring Ubuntu laptop battery usage (Linux)

- netfilter- in kernel mode network packet operation (Linux)

- MySQL full-index scan bug (Database)

- VMware virtual machine to install CentOS 7 (Linux)

- Java, hashcode, equals and == (Programming)

- How Datadog monitor Nginx (Server)

- Laravel configuration PhpStorm + Xdebug + Chrome settings Debug Environment (Server)

- Debian SSD ext4 4K aligned (Linux)

- Servlet life cycle works (Programming)

- Analysis of potential problems through custom Orabbix monitoring Oracle (Database)

- Linux Security (Linux)

- Python is not C (Programming)

- Configure the ASM process on Red Hat Linux 6.5 (Database)

- How to Install Xombrero 1.6.4 (minimalist Web browser) on Ubuntu and Archlinux (Linux)

 
         
  Common DDOS attacks
     
  Add Date : 2017-08-31      
         
         
         
  DNS has recently become a hot industry, from the open personalized domain names and non-English domain names, Turkish hacker control of ICANN's domain name, and then found that there are significant CACHE DNS vulnerability that allows hackers to easily hijack domain names. DNS beginning of the design deficiencies exist, now one by one began exposed.

Common DNS attacks include:

1) domain name hijacking

By using hacking password management control of the domain name and domain management mailbox, and then the domain NS record to point to the DNS server hacker can control, then add the appropriate domain name record on the DNS server, allowing users access to the time domain, He entered the hackers points to. This is clearly the responsibility of the DNS service providers, users helpless.

2) cache poisoning

Using the control DNS cache server, the user originally going to visit a website to other websites pointing hacker unwittingly. Its implementation in different ways, such as through the use of Internet users in the ISP's DNS cache server vulnerability to attack or control, thereby changing the response users access the domain name of the ISP within; or, hackers exploit vulnerabilities on the user's authoritative name servers, for example, when a user authoritative name server and can be used as the cache server, the hacker can achieve cache poisoning, the wrong domain name record into the cache, so that all users of the cache servers get the wrong DNS resolution result.

The recent discovery of major defects DNS is this way. So the only "significant" flaws, reportedly because the agreement itself is the design and implementation problems caused almost all DNS software such problems.

3) DDOS attacks

An attack against the DNS server software itself, often use BIND software program vulnerabilities in DNS server crash or cause denial of service; the goal is not to attack another DNS server, but to use the DNS server as the middle "attack amplifiers" go attack other hosts on the Internet, leading to a denial of service attack the host.
     
         
         
         
  More:      
 
- mysqldump issue a note (Database)
- NET Developers need to know some Linux commands (Linux)
- CentOS6.0 successful installation and configuration OpenCV (Linux)
- There is sort of a directed acyclic graph topology (Programming)
- AWR Report (Database)
- Android start automatically and add and delete a desktop shortcut (Programming)
- 5 fast Node.js application performance tips (Programming)
- Add local search to your Android app (Programming)
- Linux System Getting Started Learning: Repair fatal error openssl aes h no such file or directory (Linux)
- Getting Started with Linux: Learn how to install and access CentOS 7 Remote Desktop on a VPS (Server)
- Use Elasticsearch + Logstash + Kibana set up centralized log Practice Analysis Platform (Server)
- Use IF NOT EXISTS create a data table (Database)
- 10 important Linux ps command combat (Linux)
- Which file system is most suitable for your Linux system (Linux)
- Use libcurl library download url image (Programming)
- Linux shell script to adjust the Task Scheduler (Linux)
- Puppet centralized configuration management system (Server)
- to compile FFmpeg In Ubuntu (Linux)
- Installed in the desktop version of Ubuntu Unity Tweak Tool (Linux)
- Oracle conditional select statements and looping statements (Database)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.