Describe whether bob attack will be successful or not

Assignment Help Computer Networking
Reference no: EM132467546

Assignment: DNS and Attacks

Question 1. Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS resolver; his goal is to get the resolver to cache a false IP address for the hostname www.example.com. Bob knows that during the iterative process, a query will be sent to the root server, then to the .COM nameserver, and finally to the example.com's nameserver. He can choose to spoof replies from any of these nameservers, after triggering the iterative process from the resolver. He decides to spoof a reply from the .COM server. Please describe whether Bob's attack will be successful or not.

Question 2. Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS resolver, but his machine does not have a hostname (he launches the attack from a coffee shop using its Wi-Fi). He plans to use a random hostname in the authority section, and then provides his machine's IP address in the additional section. See the following portion of his spoofed reply. Would this approach work?

AUTHORITY SECTION:

example.com. 259200 IN NS ns.ARandomName.net

ADDITIONAL SECTION:

ns.ARandomName.net 259200 IN A 132.2.1.4

Question 3. Company XYZ sets up a website www.example.com for its internal use only, so only computers inside the company can access it. Instead of setting up a firewall to limit the access, the administrator of the web server decides to use reverse DNS lookup to check whether a client belongs to the company or not. For example, when an HTTP request comes in, the web server extracts the IP address from the request packet, conducts a reverse DNS lookup to get the hostname corresponding to the IP address. If the hostname ends with example.com, access is granted; otherwise, access is denied. You are an outsider, can you find a way to access this website?

Question 4. DNS root servers use IP Anycast to improve its scalability, which is essential against DDoS attacks. IP Anycast allows many computers to share the same IP address. These computers are typically distributed geographically. Packets to an Anycast IP address will be routed to any one of these computers, selected on the basis of which is the nearest, lowest cost, with the least congested route, or some other distance measure. Please describe how DNS root servers use this technology to achieve scalability. (hint: check Anycast from Wikipedia)

Question 5. In the DNS rebinding attack, if the victim's browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?

Reference no: EM132467546

Questions Cloud

Determine why is the given effort necessary : Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data cleansing and de-duplication.
How suitable are the choices and deployment of the colors : How suitable are the choices and deployment of these colors? If they are not, what do you think they should have been? Go through the set of.
Summarize the case or caselet : Summarize the case or caselet. Cases where the pregnancy has lifestyle consequences,Cases where the pregnancy is entirely unintentional
Crystal ball problem : Crystal ball problem - Cells B1 through B5 will be different for each organization and each activity within that organization.
Describe whether bob attack will be successful or not : Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS resolver; his goal is to get the resolver to cache a false IP address.
What communication is like in the world : What would you find to be critical in that regard? Are there things that might need to assume less importance if we are to work better together?
Explain the data cleansing technique in brief : Explain and describe 5 data cleansing technique involve in data transformation. The response must be typed, single spaced, must be in times new roman font.
Discuss about the term soy sauce of mao drawing : How might they engage in nostalgia for the past? Political Resistance? What metaphors do they employ? How might the metaphors be connected to context?
Discuss the incident management process : In the information technology field, one of the most important functions of a system is the ability to recover from an incident. This could be a simple file.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd