Secrets of DNS
Offered By: YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of DNS security in this 48-minute conference talk from DerbyCon 4. Delve into various DNS request types, cross-site scripting vulnerabilities in logs, SQL injection techniques, and the often-overlooked Gopher protocol. Examine the potential risks of shell injection and gain insights into DNS rebinding attacks. Analyze the DNS protocol, traffic forwarding methods, and shellcode payloads. Learn to detect and mitigate these threats to enhance your network's security posture.
Syllabus
Intro
You know the drill...
Things I'm going to talk about
Request types
The scenario...
Cross-site scripting in logs?
SQL Injection
Interesting sidenote... Gopher!
Shell injection - result?
DNS Re-binding summary
The protocol
Traffic forwarding
Shellcode (aka, exploit payload)
Detection
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera