Exploited Anonymity
Inconsistencies based on numerical naming, dotted names, and variable formats cause problems for hostname lookup systems. A defender, wanting to keep systems hidden, may consider using hostnames that cannot be resolved by common network analysis tools. Only tools that can handle these naming conflicts can resolve the defender's hostnames and perform lookups.
Missing Lookups
Not all hostnames contain network address mappings. Similarly, not all hostnames with network addresses contain reverse lookup information. For example, a domain name may be associated with mail exchange (MX) and text (TXT) records but not be associated with a network address. A Web server that hosts many domains may only have a reverse lookup for the primary name and not for all of its aliases.
In this tutorial:
- Domain Name System (DNS)
- DNS Common Uses
- Hostname-to-Address Mapping
- Common Lookup Tools
- Naming Confusion Attack Vectors
- Dotted Names
- Name Formatting
- Exploited Anonymity
- Mail Servers
- Sender Policy Framework Overloading
- Domain Keys Overloading
- DNS Protocol
- Packet Information
- Simple DNS Server
- Distributed Architecture
- Top Level Domain Servers
- Generic Top Level Domain (gTLD)
- Secondary Level Domain (SLD)
- Primary and Secondary Servers
- Caching Servers
- DNS Management
- DNS Direct Risks
- DNS Performance versus Security
- DNS Cache Poisoning
- Corrupt DNS Packets
- DNS Domain Hijacking
- DNS Server Hijacking
- Dynamic DNS
- Similar Hostnames
- Domain Renewals
- Hostnames
- Zone Transfers
- Host Listing
- DNS Fields
- Mitgation Option
- Technical Threat Mitigation
- Social Threat Mitigation
- Defining Trusted Replies