SlideShare a Scribd company logo
1 of 10
Download to read offline
DNS Fundamentals & Security for CERTs
          - Introduction -


              Chris Evans
               Delta Risk, LLC

               7 March 2010


                                        1
In-Class Network



Please connect to the class network:
• SSID: ROC-WAP
• Key: cctld-wap!

-or-
• Wire into the switch in the middle of the room




                                                   2
Welcome

• 1st Joint Cyber Security Workshop
   – Welcome to Day 3 – DNS Fundamentals & Security


• Thank You!
   – Forum of Incident Response & Security Teams (FIRST)
   – ICANN
      • Ms. Yurie Ito
   – INTERPOL
      • Mr. Vincent Danjean & Mr. Charles Njiri




                                                           3
About Me…


 • Chris Evans, CEH
   Delta Risk, LLC
   cevans@delta-risk.net




                           •   Strategic Consulting & Policy Development
                           •   Operational Concept Development
                           •   Security Program Assessment
                           •   Advising technology development
                           •   Cyber Exercises - Planning & Execution
                           •   Training Programs & Courseware
                           •   Expert Witness Services




                                   http://www.delta-risk.net


                                                                           4
About You…

• Name?
• Where are you from?
• Any specific experience with the Domain Name
  System – Operations or Security?




                                                 5
Course Overview

• Day 3 : 0900 – 1730
   0900 – 1030 : DNS Operational Fundamentals
   1030 – 1100 : Coffee Break
   1100 – 1200 : DNS Organization & Policy
   1200 – 1330 : Lunch
   1330 – 1500 : Threat Demonstrations & Mitigation Strategies
   1500 – 1530 : Afternoon Tea
   1530 – 1700 : Threat Demonstrations & Mitigation Strategies
   1700 – 1730 : Questions & Answers / Course Evaluation




                                                                 6
In-Class Network

• Wireless Access
  – SSID: ROC-WAP
  – Key: cctld-wap!
• Server: 192.168.75.130
• Our Attack Machine: 192.168.85.5
• Our Targets
  –   NameServer: 192.168.101.10
  –   Registry System: 192.168.101.50
  –   Web-Mail System: 192.168.101.50
  –   You – or rather, your Windows VM or host…


                                                  7
In-Class Files

• See the Wiki – 192.168.75.130 – for downloads
   – SSH Client
   – MS Terminal Services Client


• You will be given access to:
   – Ubuntu 9.04 Desktop Virtual Machine
      • Web Console Access – see wiki for links
      • SSH with X11 forwarding, for advanced users
      • Caching Nameserver
   – Windows Server 2008 Terminal Server
      • MS Terminal Server Client
      • For the Malicious Use scenario

                                                      8
Class Architecture




                     See Wiki
                      for IPs




                           9
QUESTIONS BEFORE WE
BEGIN…?

                      10

More Related Content

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Day 2 Dns Cert 1 Introduction

  • 1. DNS Fundamentals & Security for CERTs - Introduction - Chris Evans Delta Risk, LLC 7 March 2010 1
  • 2. In-Class Network Please connect to the class network: • SSID: ROC-WAP • Key: cctld-wap! -or- • Wire into the switch in the middle of the room 2
  • 3. Welcome • 1st Joint Cyber Security Workshop – Welcome to Day 3 – DNS Fundamentals & Security • Thank You! – Forum of Incident Response & Security Teams (FIRST) – ICANN • Ms. Yurie Ito – INTERPOL • Mr. Vincent Danjean & Mr. Charles Njiri 3
  • 4. About Me… • Chris Evans, CEH Delta Risk, LLC cevans@delta-risk.net • Strategic Consulting & Policy Development • Operational Concept Development • Security Program Assessment • Advising technology development • Cyber Exercises - Planning & Execution • Training Programs & Courseware • Expert Witness Services http://www.delta-risk.net 4
  • 5. About You… • Name? • Where are you from? • Any specific experience with the Domain Name System – Operations or Security? 5
  • 6. Course Overview • Day 3 : 0900 – 1730 0900 – 1030 : DNS Operational Fundamentals 1030 – 1100 : Coffee Break 1100 – 1200 : DNS Organization & Policy 1200 – 1330 : Lunch 1330 – 1500 : Threat Demonstrations & Mitigation Strategies 1500 – 1530 : Afternoon Tea 1530 – 1700 : Threat Demonstrations & Mitigation Strategies 1700 – 1730 : Questions & Answers / Course Evaluation 6
  • 7. In-Class Network • Wireless Access – SSID: ROC-WAP – Key: cctld-wap! • Server: 192.168.75.130 • Our Attack Machine: 192.168.85.5 • Our Targets – NameServer: 192.168.101.10 – Registry System: 192.168.101.50 – Web-Mail System: 192.168.101.50 – You – or rather, your Windows VM or host… 7
  • 8. In-Class Files • See the Wiki – 192.168.75.130 – for downloads – SSH Client – MS Terminal Services Client • You will be given access to: – Ubuntu 9.04 Desktop Virtual Machine • Web Console Access – see wiki for links • SSH with X11 forwarding, for advanced users • Caching Nameserver – Windows Server 2008 Terminal Server • MS Terminal Server Client • For the Malicious Use scenario 8
  • 9. Class Architecture See Wiki for IPs 9