Describe whether bob attack will be successful or not

Assignment Help Computer Networking
Reference no: EM132467546

Assignment: DNS and Attacks

Question 1. Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS resolver; his goal is to get the resolver to cache a false IP address for the hostname www.example.com. Bob knows that during the iterative process, a query will be sent to the root server, then to the .COM nameserver, and finally to the example.com's nameserver. He can choose to spoof replies from any of these nameservers, after triggering the iterative process from the resolver. He decides to spoof a reply from the .COM server. Please describe whether Bob's attack will be successful or not.

Question 2. Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS resolver, but his machine does not have a hostname (he launches the attack from a coffee shop using its Wi-Fi). He plans to use a random hostname in the authority section, and then provides his machine's IP address in the additional section. See the following portion of his spoofed reply. Would this approach work?

AUTHORITY SECTION:

example.com. 259200 IN NS ns.ARandomName.net

ADDITIONAL SECTION:

ns.ARandomName.net 259200 IN A 132.2.1.4

Question 3. Company XYZ sets up a website www.example.com for its internal use only, so only computers inside the company can access it. Instead of setting up a firewall to limit the access, the administrator of the web server decides to use reverse DNS lookup to check whether a client belongs to the company or not. For example, when an HTTP request comes in, the web server extracts the IP address from the request packet, conducts a reverse DNS lookup to get the hostname corresponding to the IP address. If the hostname ends with example.com, access is granted; otherwise, access is denied. You are an outsider, can you find a way to access this website?

Question 4. DNS root servers use IP Anycast to improve its scalability, which is essential against DDoS attacks. IP Anycast allows many computers to share the same IP address. These computers are typically distributed geographically. Packets to an Anycast IP address will be routed to any one of these computers, selected on the basis of which is the nearest, lowest cost, with the least congested route, or some other distance measure. Please describe how DNS root servers use this technology to achieve scalability. (hint: check Anycast from Wikipedia)

Question 5. In the DNS rebinding attack, if the victim's browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?

Reference no: EM132467546

Questions Cloud

Determine why is the given effort necessary : Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data cleansing and de-duplication.
How suitable are the choices and deployment of the colors : How suitable are the choices and deployment of these colors? If they are not, what do you think they should have been? Go through the set of.
Summarize the case or caselet : Summarize the case or caselet. Cases where the pregnancy has lifestyle consequences,Cases where the pregnancy is entirely unintentional
Crystal ball problem : Crystal ball problem - Cells B1 through B5 will be different for each organization and each activity within that organization.
Describe whether bob attack will be successful or not : Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS resolver; his goal is to get the resolver to cache a false IP address.
What communication is like in the world : What would you find to be critical in that regard? Are there things that might need to assume less importance if we are to work better together?
Explain the data cleansing technique in brief : Explain and describe 5 data cleansing technique involve in data transformation. The response must be typed, single spaced, must be in times new roman font.
Discuss about the term soy sauce of mao drawing : How might they engage in nostalgia for the past? Political Resistance? What metaphors do they employ? How might the metaphors be connected to context?
Discuss the incident management process : In the information technology field, one of the most important functions of a system is the ability to recover from an incident. This could be a simple file.

Reviews

Write a Review

Computer Networking Questions & Answers

  Question 1broadly sort and discuss the types of safekeeping

question 1broadly sort and discuss the types of safekeeping that exists in communications?question 2a briefly confer

  Define disadvantages of using a vpn instead of a leased line

What are the disadvantages of using a VPN instead of a leased line? If a hacker hacks into a network, copies a few files, defaces the Web page.

  Comprehensive authentic assessment plan

Comprehensive Authentic Assessment Plan Deliverables- For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design

  What are three major features of whats connected

Installing an Advanced Network Monitor Time Required: 45 minutes or more Objective: Use network-monitoring software to gather information about your network.

  Which media type should you use to wire the network and why

Discuss how network standards such as the OSI help to ensure interoperability? Which media type should you use to wire the network and why?

  Ip subnet design project-technical design of network service

technical design of network services - You are a consultant being brought in by XUMUC to assist with its merger with another company

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

  Compare the osi and tcp-ip network models

Compare the OSI and TCP/IP network models and use the command line to test connectivity in a network.

  Relationship between increased social responsibility

What is the relationship between increased social responsibility and IT at the workplace?

  What is the purpose of class d ip addresses

Convert the number 65 to its binary equivalent. Convert the number 96 to its binary equivalent.

  Maximum size of file-tcp sequence numbers are not exhausted

Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes. What is the maximum value of L such that the TCP sequence numbers are not exhausted?

  Monitoring passing traffic over the networks

How would the routers help in monitoring passing traffic over the networks and Internet under safe and secure conditions? Provide examples of how it would be done and why it would be done in this fashion.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd