DNS rebinding

DNS rebinding

DNS rebinding is a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script that attacks machines elsewhere on the network. In theory, the same-origin policy prevents this from happening: client-side scripts are only allowed to access content on the same host that served the script. This is enforced by comparing domain names, so DNS rebinding circumvents this protection by abusing the Domain name system (DNS).

This attack can be used to breach a private network by causing the victim's web browser to access machines at private IP addresses and returning the results to the attacker. It can also be used to leverage the victim machine for spamming, distributed denial of service attacks and other malicious activities.

How DNS rebinding works

The attacker registers a domain (such as attacker.com) and delegates it to a DNS server he controls. The server is configured to respond with a very short time to live (TTL) record, preventing the response from being cached. When the victim browses to the malicious domain, the attacker's DNS server first responds with the IP address of a server hosting the malicious client-side code. For instance, he could point the victim's browser to a web site that contains malicious JavaScript or Flash.

The malicious client-side code makes additional accesses to the original domain name (such as attacker.com). These are permitted by the same-origin policy. However, when the victim's browser runs the script it makes a new DNS request for the domain, and the attacker replies with a new IP address. For instance, he could reply with an internal IP address or the IP address of a target somewhere else on the internet.

Protection

The following techniques attempt to prevent DNS rebinding attacks:

  • Web browsers can implement DNS pinning: the IP address is locked to the value received in the first DNS response. This technique may block some legitimate uses of Dynamic DNS.
  • Local sysadmins can configure the organization's local nameservers to block the resolution of external names into internal IP addresses.
  • Web servers can reject HTTP requests with an unrecognized Host header.

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • DNS rebinding — Saltar a navegación, búsqueda DNS rebinding es un ataque basado en DNS de código embebido en páginas web aprovechándose de la política del mismo origen de los navegadores. Contenido 1 USO 2 Cómo funciona el DNS rebinding 3 …   Wikipedia Español

  • NoScript — For the <noscript> HTML element, see HTML element#Other block elements. NoScript Developer(s) Giorgio Maone Stable release 2.1.8 / October 28, 2011; 10 days ago …   Wikipedia

  • Dan Kaminsky — Kaminsky in 2007. Occupation Computer security researcher Known for Discovering the 2008 DNS cache poisoning vulnerability Dan Kam …   Wikipedia

  • Dan Kaminsky — im Jahr 2007 Dan Kaminsky ist ein Spezialist für Computersicherheit und Geschäftsführer des Penetration Testing Unternehmens IOActive. Er hat bisher für Cisco und Avaya gearbeitet[1] …   Deutsch Wikipedia

  • Dan Kaminsky — Pour les articles homonymes, voir Kaminsky. Dan Kaminsky Métadonnées personne …   Wikipédia en Français

  • Kaminsky — Dan Kaminsky Dan Kaminsky Dan Kaminsky est un chercheur en sécurité informatique qui travaille pour IOActive et qui travailla précédemment pour Cisco et Avaya[1] …   Wikipédia en Français

  • Same origin policy — In computing, the same origin policy is an important security measure for client side scripting (mostly JavaScript). The policy dates from Netscape Navigator 2.0, with necessary coverage fixes in Navigator 2.01 and Navigator 2.02. It prevents a… …   Wikipedia

  • NoScript — es una extensión libre y de fuente abierta para Mozilla Firefox, SeaMonkey, Flock y navegadores web basados en Mozilla. NoScript bloquea la ejecución de Javascript, Java, Flash, Silverlight, y otros plugins y contenidos de scripts. Noscript tiene …   Wikipedia Español

  • Same-Origin-Policy — Die Same Origin Policy (SOP) ist ein Sicherheitskonzept, das es JavaScript und ActionScript nur dann erlaubt, auf Objekte einer anderen Webseite zuzugreifen, wenn sie aus derselben Quelle (Origin) stammen. Sie stellt ein wesentliches… …   Deutsch Wikipedia

  • Dynamic Host Configuration Protocol — DHCP redirects here. For other uses, see DHCP (disambiguation). A DHCP Server settings tab The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”