DNS

There are different attacks on DNS servers which require organizations to apply the appropriate security mitigations to prevent such attacks. You are required to perform the following:

  1. What is a “whois” database?
  2. Use various “whois” databases to perform the following:
  3. Obtain the names of two DNS servers. Indicate which “whois” database you’re used?
  4. Determine the IP address range used by your university?
  5. Identify at least two common attacks attempted against DNS servers.
  6. Provide the technical security measures or methodologies that can be implemented to prevent the attacks.
  7. Describe how an attacker can use “whois” databases and the “nslookup” tool to perform reconnaissance on an institution before launching an attack?

Leave a Reply

Your email address will not be published. Required fields are marked *