There are different attacks on DNS servers which require organizations to apply the appropriate security mitigations to prevent such attacks. You are required to perform the following:
- What is a “whois” database?
- Use various “whois” databases to perform the following:
- Obtain the names of two DNS servers. Indicate which “whois” database you’re used?
- Determine the IP address range used by your university?
- Identify at least two common attacks attempted against DNS servers.
- Provide the technical security measures or methodologies that can be implemented to prevent the attacks.
- Describe how an attacker can use “whois” databases and the “nslookup” tool to perform reconnaissance on an institution before launching an attack?

Leave a Reply