Saturday, 27 May 2023

DNSSEC, From An End-User Perspective, Part 3

In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases?

The following list are the attack types from the first post, where DNSSEC can protect the users:

  • DNS cache poisoning the DNS server, "Da Old way"
  • DNS cache poisoning, "Da Kaminsky way"
  • ISP hijack, for advertisement or spying purposes
  • Captive portals
  • Pentester hijacks DNS to test application via active man-in-the-middle
  • Malicious attacker hijacks DNS via active MITM

The following list are the attack types from the first post, where DNSSEC cannot protect the users:

  • Rogue DNS server set via malware
  • Having access to the DNS admin panel and rewriting the IP
  • ISP hijack, for advertisement or spying purposes
  • Captive portals
  • Pentester hijacks DNS to test application via active man-in-the-middle
  • Malicious attacker hijacks DNS via active MITM

If you are a reader who thinks while reading, you might say "What the hell? Am I protected or not???". The problem is that it depends… In the case where the attacker is between you and your DNS server, the attacker can impersonate the DNS server, downgrade it to a non DNSSEC aware one, and send responses without DNSSEC information.

Now, how can I protect against all of these attacks? Answer is "simple":
  1. Configure your own DNSSEC aware server on your localhost, and use that as a resolver. This is pretty easy, even I was able to do it using tutorials.
  2. Don't let malware run on your system! ;-)
  3. Use at least two-factor authentication for admin access of your DNS admin panel.
  4. Use a registry lock (details in part 1).
  5. Use a DNSSEC aware OS.
  6. Use DNSSEC protected websites.
  7. There is a need for an API or something, where the client can enforce DNSSEC protected answers. In case the answer is not protected with DNSSEC, the connection can not be established.

Now some random facts, thoughts, solutions around DNSSEC:

That's all folks, happy DNSSEC configuring ;-)

Note from David:
Huh, I have just accidentally deleted this whole post from Z, but then I got it back from my browsing cache. Big up to Nir Sofer for his ChromeCacheView tool! Saved my ass from kickin'! :D

More articles


  1. Pentest Tools Download
  2. Hacker Hardware Tools
  3. Hack Website Online Tool
  4. Best Hacking Tools 2020
  5. Hacking Apps
  6. Top Pentest Tools
  7. Pentest Tools Free
  8. Best Hacking Tools 2019
  9. Game Hacking
  10. Hacker Tools For Ios
  11. Computer Hacker
  12. Hack Tools 2019
  13. Pentest Tools Windows
  14. Hacker Security Tools
  15. Hacker
  16. Pentest Tools Find Subdomains
  17. Hacks And Tools
  18. Pentest Tools Free
  19. Hak5 Tools
  20. Physical Pentest Tools
  21. Pentest Tools Port Scanner
  22. Pentest Tools For Mac
  23. Hack Tools Mac
  24. Hacking Tools For Games
  25. Hacker Tools Free Download
  26. Termux Hacking Tools 2019
  27. Hacker Tools 2019
  28. Pentest Tools Linux
  29. Hack Tools For Games
  30. Growth Hacker Tools
  31. Pentest Tools Url Fuzzer
  32. Hacking Tools Hardware
  33. Hacking Tools Windows
  34. Hacker Tools Free
  35. Install Pentest Tools Ubuntu
  36. Hack Tools For Games
  37. Hacker Tools Software
  38. Hacker Tools List
  39. Hack Tools Mac
  40. Tools 4 Hack
  41. Pentest Tools Nmap
  42. Hacking Tools For Windows 7
  43. Pentest Box Tools Download
  44. Black Hat Hacker Tools
  45. Hacking Tools For Windows
  46. Underground Hacker Sites
  47. Best Hacking Tools 2020
  48. Hacking Tools Pc
  49. Hacker
  50. Pentest Tools Apk
  51. Pentest Tools Alternative
  52. Pentest Tools Website
  53. Physical Pentest Tools
  54. Pentest Tools Framework
  55. Termux Hacking Tools 2019
  56. Hacker Tools For Pc
  57. Blackhat Hacker Tools
  58. Termux Hacking Tools 2019
  59. Hack Tools
  60. Hacking Tools For Games
  61. Hacker Tools For Pc
  62. Hack Tools For Ubuntu
  63. Pentest Tools Url Fuzzer
  64. Hacking Tools
  65. How To Hack
  66. Pentest Tools Website
  67. Hacking Tools Mac
  68. Hacker Tool Kit
  69. Underground Hacker Sites
  70. Easy Hack Tools
  71. What Are Hacking Tools
  72. Hacker Tools
  73. Pentest Tools Framework
  74. Pentest Tools Android
  75. Hacker Tools Linux
  76. Hacking Tools Pc
  77. Hacking Tools Usb
  78. Hacking Tools Github
  79. Hack Tools For Mac
  80. Hacker Search Tools
  81. Pentest Tools Url Fuzzer
  82. Pentest Box Tools Download
  83. How To Install Pentest Tools In Ubuntu
  84. Hacker Tools Windows
  85. Hacking Tools For Windows Free Download
  86. Hackrf Tools
  87. Pentest Tools Bluekeep
  88. Hacking Tools Github
  89. Hack Tools
  90. Pentest Tools Find Subdomains
  91. Free Pentest Tools For Windows
  92. Pentest Tools Framework
  93. Physical Pentest Tools
  94. Nsa Hacker Tools
  95. Hacker Tools For Mac
  96. Hacker Tools List
  97. Hacker Hardware Tools
  98. Hacker Tools 2019
  99. New Hack Tools
  100. Android Hack Tools Github
  101. Hackrf Tools
  102. Computer Hacker
  103. Hacker Tools Mac
  104. Hacking Tools For Kali Linux
  105. Game Hacking
  106. Nsa Hacker Tools
  107. Wifi Hacker Tools For Windows
  108. Hacker Tools Online
  109. Pentest Tools Bluekeep
  110. Tools Used For Hacking
  111. Growth Hacker Tools
  112. Hack Tools For Mac
  113. Bluetooth Hacking Tools Kali
  114. Ethical Hacker Tools

0 comments:

Post a Comment