Turning DNS from Security Target into Security Tool
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore how DNS servers can be transformed from security targets into powerful security tools in this 44-minute conference talk from RSA Conference. Learn about recent developments that allow for instrumenting DNS servers to implement policies based on domain name and IP address reputation, and utilize DNS telemetry to identify malicious patterns. Discover how malware exploits DNS throughout its lifecycle, understand the implementation of response policy zones for DNS resolution policies, and delve into passive DNS data collection and analytics. Gain insights into DNS tunneling, infiltration techniques, and real-world case studies. Apply this knowledge to enhance your organization's security posture by leveraging DNS as a proactive defense mechanism.
Syllabus
Intro
Most Malware Uses DNS in Attacks
How DNS Is (Ab) Used: Finding a C&C Server
How DNS IS (Ab)Used: Tunneling
DNS Tunneling Example: Infiltration
Actual Photograph of Paul Publishing His Blog
Enter Response Policy Zones
How Response Policy Zones Work
Enter Passive DNS
Passive DNS Databases
Closing the Loop
Case Study: Farsight's NOD Feed
How to Apply What You've Learned Today
Taught by
RSA Conference
Related Courses
Implementing DNS in Microsoft Windows ServerMicrosoft via edX Networking for Web Developers
Udacity Microsoft Windows Server 2012 Fundamentals: DNS
Microsoft via edX Windows Server 2016: Basic Networking
Microsoft via edX The Bits and Bytes of Computer Networking
Google via Coursera