VGNet.NL
Technology Professional
    RSS
    • About
    • Certification
      • Check Point
      • Cisco
      • F5
      • IBM ISS
      • Microsoft
      • Nortel Networks
      • RSA SecurID
    • Contact
    • Experience
      • Analysis
        • Certificates
          • OpenSSL
        • Firewalls
          • Checkpoint
          • Fortigate
        • Networking
          • Netflow
          • Nmap
          • TCPdump
          • Wireshark
        • Performance
          • Unix
      • IT Infrastructure
        • Databases
        • DNS
        • Mail
        • Web Service
      • Monitoring
        • Cacti
        • Observium
      • Networking
        • High Availability
      • Security
        • Encryption
        • Firewalls
        • IPS
      • Web Design
        • CMSimple
        • Joomla
        • WordPress
    • Knowledge
      • eMail
        • Amavis DKIM
        • DKIM
        • DMARC
        • SPF
      • IT Infrastructure
        • DNS
      • Monitoring
        • Cacti
        • Observium
      • Networking
        • Cisco
        • Ethernet
        • TCP/IP
        • Wi-FI
      • OS
        • Mac OSX
        • Unix
          • GNU/Linux
          • NetBSD
        • Windows
      • Security
        • PKI
      • Virtualization
        • VMware
    • Vendors
      • Check Point
      • Cisco
      • dMarcian
      • Imperva
      • Juniper
      • RSA SecurID

    Dec 15 2013

    DNS amplification attack

    DNS Amplification AttackDNS amplification explained

    A DNS amplification attack is a type of distributed denial of service (DDoS) attack that takes advantage of the fact that a small DNS query can generate a much larger response. An attacker can direct a large volume of network traffic to a victim’s system by initiating relatively small DNS queries. The attacker spoofs the IP address of the victim to reflect the network traffic using the DNS server. This makes it difficult to trace the attacker.

    In order to launch a DNS amplification reflection attack the attacker needs to perform two tasks. First the attacker spoofs the address of the victim. This is the reflection part, it will cause all the reply’s from the DNS server to be directed to the victim’s server. This can easily be done since in UDP no handshake (like in TCP) is being done between the client and the server. Secondly the requester searches for responses that are several times bigger than the request. The attacker achieves an amplification factor because the response is many times larger than the request. The amplification can even be larger when DNSSEC is used, because of the signatures used the size of the response increases.

    Explained by NLnetlabs: download

    By MyShare • Security

    Dec 2 2013

    OpenSSL PKI Tutorial

    OpenSSL PKI security architecture.

    PKI ProcessAt its heart, an X.509 PKI is a security architecture that uses well-established cryptographic mechanisms to support use-cases like email protection and web server authentication. In this regard it is similar to other systems based on public-key cryptography, for example OpenPGP [RFC 4880]. In the realm of X.509 however, and thanks to its roots in a globe-spanning scheme devised by the telecom industry, these mechanisms come with a fair amount of administrative overhead.

    One thing to keep in mind is that X.509 is not an application, but a specification upon which applications like Secure Multipurpose Internet Mail Extensions (S/MIME) and Transport Layer Security (TLS) are based. The building blocks are very generic and derive most of their meaning from the relations that exist/are established between them. It’s called an infrastructure for a reason.

    Visit: PKI tutorial to learn more about PKI.

    By MyShare • Security • Tags: PKI

    Oct 8 2013

    Social engineering

    Tsutomu Shimomura TakedownIf you are serious about IT security then this book is a must. Take the time to read it and try to understand the power of social engineering. There is no single technique in this world that can protect you against a good social engineering attack. This book is written by Tsutomu Shimomura together with John Markoff and tells the story about one of the first well known “hackers” Kevin Mitnick.

    Especially the fact that Kevin Mitnick has good social engineering skills make him a pro in getting excess to secure environments.

    ISBN-10: 0-7868-8913-6

    By MyShare • Security • Tags: Social Engineering

    Sep 27 2013

    Everyday cybercrime what you can do about it

    In an ever expanding world of networked mobile devices, security threats and our ignorance of them are more widespread than ever. James Lyne of security firm Sophos believes that if we continue to ignore basic best practices, security is on a trajectory of failure.

    Source: TED

    By MyShare • Security

    «‹ 3 4 5 6 ›

    RSS Bugtraq

    • Re: [SECURITY] [DSA 4628-1] php7.0 security update
    • Re: BugTraq Shutdown
    • On Second Thought...
    • BugTraq Shutdown

    RSS Full Disclosure

    • CFP ZeroNights 2021
    • Backdoor.Win32.Small.n / Unauthenticated Remote Command Execution (SYSTEM)
    • [SYSS-2020-032] Open Redirect in Tableau Server (CVE-2021-1629)
    • Backdoor.Win32.Hupigon.das / Unauthenticated Open Proxy
    • Trojan.Win32.Hotkeychick.d / Insecure Permissions

    RSS Security.NL

    • Advertentiebedrijf wil e-mailadres als nieuwe trackingmethode inzetten
    • Onderzoekers ontwikkelen webcam in vorm van levensecht menselijk oog
    • Politie neemt in onderzoek naar phishing 300.000 euro in beslag
    • Gegevens 21 miljoen gebruikers ParkMobile aangeboden op internet
    • Brave: nieuwe trackingmethode in Chrome schaadt privacy gebruikers

    Comment

    Private

    • Amateur Radio PEØSAT

    Popular Topics

    CVE-2014-0160 CVE-2014-6271 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 CVE-2015-3456 CVE-2015-4000 DoH Heartbleed Loglam Network PKI POODLE Professional Security Social Engineering Technology Unlock encryption Venom WeakDH

    ↑

    © VGNet.NL 2021
    Powered by WordPress • Themify WordPress Themes