A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Wow, it really is always DNS! Becoming a Part of the DDoS Problem ( on purpose ). - Cody Smith BSides Columbus Ohio 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

Wow, it really is always DNS! Becoming a Part of the DDoS Problem ( on purpose ).
Cody Smith
BSides Columbus Ohio 2019

It's been said that Domain Name System based Distributed Denial of Service attacks are still a large issue for the internet. So, to better analyze and understand the issue I ran a large network of DNS Honeypots on the internet for a year. Their mission? To do one thing, watch when they become part of a DDoS Attack. Together, we'll overview what a DDoS attack is, and how a DNS amplification based attack works. We'll go through what my distributed network looked like, what it cost, and how it was created. Then, we'll break down how my servers have been abused by malicious actors to make them part of the DDoS problem.

Things I like: RFC1034, RFC1035, MacOS, BSD, Topre Switches, a good Alfredo, and network security. Things I dislike: Open DNS Resolvers.

Back to BSides Columbus Ohio 2019 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast