Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978387
|View full text |Cite
|
Sign up to set email alerts
|

All Your DNS Records Point to Us

Abstract: In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but the record itself has not yet been purged from DNS. In this paper, we shed light on a largely overlooked threat in DNS posed by dangling DNS records. Our work reveals that Dare can be easily manipulated by adversaries for domain hijacking. In particular, we identify three attack vectors that an adversary can harness to exploit Dares. In a large-scale measurement study, we uncover 467 exploitable Dares in 277 Alexa top … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 48 publications
(13 citation statements)
references
References 21 publications
(26 reference statements)
0
13
0
Order By: Relevance
“…Liu et al show that dangling delegation records referring to expired resources (e.g., cloud IP addresses or names) left in the parent or child pose a significant risk [11]. An attacker can obtain control of these records through the same cloud services by randomly registering new services, and in this way take control of the domain.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Liu et al show that dangling delegation records referring to expired resources (e.g., cloud IP addresses or names) left in the parent or child pose a significant risk [11]. An attacker can obtain control of these records through the same cloud services by randomly registering new services, and in this way take control of the domain.…”
Section: Background and Related Workmentioning
confidence: 99%
“…According to RFC2181 resolvers may prefer this information over the delegation provided by the parent. Indeed, in rounds [1][2][3][4][5][6][7][8][9][10][11] we see traffic also going to the child name servers. However, not all traffic goes to servers in the child NSSet, because not all resolvers trust data from the "authority section" due to mitigations against the so-called Kaminsky attack [8].…”
Section: Implications Of Nsset Differences In the Wildmentioning
confidence: 99%
“…Without an explicit comparison between the current webpage and its phishing target, such methods utilize the extracted features to build a binary classifier. The features can be computed from the webpage URL [1]- [6], HTML content [7], queries to remote servers [8], [9], and even publicly-available blacklisting services [10]. However, the attackers have the potential to infer relevant information about the classifier rules.…”
Section: A Background Information and Literature Review For Phishingmentioning
confidence: 99%
“…According to the URL specification [37], 1 we divide a collection of URLs into three collections of URL segments: domain, directory, and file. For example, a given URL ''https://www.airport-information.com/website/ index.php/en/reference-list'' is divided into three segments: domain segment ''www.airport-information.com'', directory segment ''website/index.php/en'', and file segment ''reference-list''.…”
Section: Url Quality Scorementioning
confidence: 99%
See 1 more Smart Citation