Computer Security - Securing Infrastructure Services Lec IV
Computer Security - Securing Infrastructure Services Lec IV
◼ Every DNS answer has a timeout value (usually two days) that tells
when this record may be changed.
◼ Keep the address in cache for the specific period of time to avoid having to
look it up every time a software to make a connection.
◼ Query the cache directly until the timeout expires.
◼ Berkeley Internet Name Domain (BIND) is a DNS server provided free by the
Internet Software Consortium (ISC) and is the most common DNS service for
Unix computers.
◼ Numerous exploits have been discovered for BIND, and they are widely used to
attack DNS servers running it.
◼ Make sure you consistently install the latest patches in a timely fashion.
◼ Best solution:
◼ Make sure you run the most up-to-date version of the DNS server software, and keep
it updated, to minimize the vulnerabilities that lead to cache poisoning.
◼ Recommendation:
◼ Disable the Recursive
functionality of DNS
Servers or limit it to the
clients in your network.
◼ Separate the DNS Servers
that are authoritative to
some domains and the
ones used by internal
users to resolve the
names.
◼ The dir command lists all the files in the current directory
and sends the results back to the user.
◼ Attackers can perform more complex commands in order to
delete, run, or modify data on the web server.
◼ Recommendation:
◼ Set executable permissions only on a folder that contains
only the server-side applications.
Prepared by: Kushan Sharma 21
Directory Browsing
◼ Directory browsing is usually
disabled, but if it is enabled,
it shows the list of all files in
that directory and allows
browsing of subdirectories.
◼ Sometimes the knowledge
of a file’s existence can help
an attacker exploit
vulnerabilities in files and
programs on the web
server.
◼ Recommendation:
◼ Disable directory browsing
on a web servers.
◼ HELO (as in hello) is the command that opens the SMTP session. This send the
client’s identifying name to the mail server.
◼ MAIL FROM is the command sent to define the current e-mail sender’s
address.
◼ DATA is the command that tells the server you are ready to send the
contents of the e-mail.
◼ The mail server should be configured to ignore these commands because they
can be used to gather information about users on the server.
◼ PASS is the command that sends the password for the username given
in the USER command.
◼ A good mail server always waits a few seconds after a failed login in
order to slow down brute-force attack attempts.
◼ How do I get spam even though you haven't submitted your e-mail to
any advertisement company?
◼ E-mail addresses are easy to obtain from:
◼ Compromised websites and social networking services
◼ Sold by marketing companies
◼ Can be harvested from peoples’ address books by malware
◼ Difficult to trace back to the original sender.
◼ Every year, more than 72 trillion spam e-mails are sent worldwide, and
the number continues to grow.