Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Black Ops of DNS

Type
Audio
Tags
DNS
Authors
Dan Kaminsky
Event
Chaos Communication Congress 21th (21C3) 2004
Indexed on
Mar 27, 2013
URL
http://ftp.ccc.de/congress/21c3/audio/121%20Black%20Ops%20of%20DNS.mp3
File name
121%20Black%20Ops%20of%20DNS.mp3
File size
26.0 MB
MD5
47e80c04a8734464cdcb7247a20e1129
SHA1
6cf6316ae2f5d2fc3bb40a1d8e8687252d9fd8ca

DNS is best known for translating domain names into the numerical addresses the Internet can route. But it's capable of so much more. Ultimately, DNS is a globally deployed, routing, caching overlay network deployed across the entire Internet, both public and private. From traversing firewalls to the mass duplication of audio streams, we will demonstrate some unexpected features of this ancient system. The Domain Name System is a powerful, flexible, and integral part of the Internet. DNS's most common use is to translate names -- such as www.blackhat.com -- to addresses -- 216.231.63.34. But behind this deceptively simple operation lies a complex and interesting system, distributed widely but with a deeply centralized core. Though most commonly used to execute simple translations of the sort mentioned earlier, three aspects of the machinery lend themselves to more creative exploits. By creatively abusing the heirarchal, recursive, and cache-oriented nature of the multi-million-node DNS architecture, we can effect a range of unexpected functionality, including firewall penetration, bidirectional anonymous communication, large scale data transmission, and even "Voice over DNS".

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !