Release software to check DNS server vulnerabilities
According to Bach Khoa Network Security Center (Bkis), DNS cache poisoning vulnerabilities are placing DNS server systems in Vietnam as well as around the world at the risk of hackers attacking and poisoning on a large scale.
This is a particularly serious vulnerability when hackers have a new way to successfully exploit this vulnerability. This confuses many network administrators when there is no tool to check if their DNS server system has this error and how to fix it.
On July 25, 2008, Bkis released Bkav DNS Check software to allow checking and detecting DNS server system with Subdomain Exploit DNS Cache Poisoning vulnerability. Along with the release of this software, Bkis also instructed how to fix the vulnerability to avoid the risk of outbreaks of DNS attacks in Vietnam.
To check if your system is at fault, network administrators of agencies and ISPs follow these steps:
1. Download Bkav DNS Check at the following address : http://www.bkav.com.vn/DNSCheck/BkavDNSCheck.exe
2. Configure DNS Server Forwarders : to point domain name BkavDnsCheck.vn to IP address 203.162.1.239 (server address of the software to check Bkav DNS Check error). Detailed instructions download at the following address: http://www.bkav.com.vn/DNSCheck/BkavDNSCheckGuide.html
In case the test results show an error, do the following to proceed:
1. Check which DNS system you are using is the manufacturer's software (Microsoft, Red Hat, .)
2. Error according to the instruction manual corresponding to your DNS system:
+ Microsoft : http://www.bkav.com.vn/DNSCheck/Microsoft
+ Red Hat : http://www.bkav.com.vn/DNSCheck/RedHat
+ FreeBSD : http://www.bkav.com.vn/DNSCheck/FreeBSD
+ Sun : http://www.bkav.com.vn/DNSCheck/Sun
+ Cisco Systems : http://www.bkav.com.vn/DNSCheck/Cisco
For individual users, care should be taken during this time when accessing the Internet. If you go to a familiar website but encounter an unusual phenomenon, you should immediately inform the network administrator of the agency, ISP technical support, to take timely measures. You should also fully update the operating system patches and antivirus software to avoid the risk of malicious code infection.
DNS protocol is address resolution protocol, used to map domain names (domain names) to Internet addresses (IP). According to this protocol, when the DNS server receives the request for address resolution (request) from the workstation, it will look up in the buffer (cache) and return the IP address corresponding to the domain name that the client requires. . However, if it is not found in the buffer, the DNS server will forward the resolution request to another DNS server. This is the stage that has been discovered to have a serious vulnerability and the exploit code for this vulnerability has been spread on the Internet in the past few days.
The hacker's DNS cache poisoning approach is as follows: hacker (machine H) sends a series of address resolution requests to the victim DNS server (machine A). Domain names that need to be resolved have been calculated by hackers so that server A cannot find in its buffer and must forward it to the next DNS server (machine B). Each resolution exchange between A and B is authenticated through a random TID (Transaction ID). However, the weakness here is that this TID number is only a 16 bit number (less than 65535) and all exchanges between A and B occur on a fixed port (port) of A.
The DNS cache poisoning vulnerability first appeared in the 1990s. Since then hackers have used various methods to exploit this vulnerability. This is an error in the design of the DNS protocol. For each method of exploitation, software manufacturers DNS Server has also provided patches to prevent and the problem has been fixed. However, the hacker has recently discovered a new attack method, continuing to exploit the DNS cache poisoning vulnerability.
The most important point in this method of exploiting DNS cache poisoning vulnerabilities is that hackers use subdomains (subdomains) to create valid address resolution requests. Subdomains are randomly generated in large numbers, which ensures that these domains never exist in server A's cache and force A to generate the same number of requests for forwarding to the server. B. As a result, the probability of a B-spoofing response packet generated by a hacker has a TID coinciding with the TID that machine A is waiting to be upgraded many times. The chances of successfully poisoning server A's buffer are thus enhanced.
You should read it
- Detecting high-risk vulnerabilities potentially affecting 1 million servers worldwide
- Immediately patch CWP vulnerability that allows code execution as root on Linux servers
- SaltStack has the most serious vulnerability ever, thousands of servers can be seriously affected
- More than 70,000 Memcached servers are still capable of being hacked remotely
- Hundreds of thousands of IoT devices are likely to be attacked by vulnerabilities on the server
- ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
- The Mail app on iOS has serious vulnerabilities
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
May be interested
- Immediately patch CWP vulnerability that allows code execution as root on Linux serverssecurity researchers have discovered two new vulnerabilities affecting control web panel (cwp) software. hackers could chain these two vulnerabilities to gain remote code execution (rce) privileges as root on vulnerable linux servers.
- Microsoft rushed to release security updates for Windows XP, Server 2003if you are still using a copy of windows xp or windows server 2003 on networked systems (and both windows 7, windows server 2008 and 2008 r2), pay attention!
- Oracle Database has more errors than SQL Servernext generation security software (ngss), a uk software company, conducted a study of microsoft's sql server database software and oracle's relational database management (rdbm) program. the results show that sql has more security advantages than oracle.
- Top best SCP Server softwaresecure copy, or sc for short, is a network protocol that supports file transfers between servers on the same network. it is based on the bsd rcp protocol and uses secure shell (ssh) to transfer data.
- Top free and paid Syslog Server software for Windowssyslog server is an important part of it administrators' arsenal, especially when it comes to managing event logs in a centralized location.
- Instructions on how to check the PHP versionif you are interested in adding new features on your site or trying to identify a programming error, you may have to check the php version that the server is currently using. join tipsmake.com to consult the article on how to check the php version below!
- How to check if the computer has serious Windows 10 vulnerabilitiesrecently, the us national security agency (nsa) has detected a serious security hole on windows 10 and microsoft has also released a patch to fix it. bkav has also recently released a tool to help windows 10 users check if their computer has been patched for the nsacrypt flaw.
- Critical error on Apache Struts2 allows hackers to take over the web servernew researchers have discovered a remote code execution flaw in the apache struts open source web application framework, allowing an attacker to run malicious code on the server.
- What's new in SQL Server Management Studio 18.7?the sql server management studio (ssms) 18.7 release is available for download now. today, we will be sharing some updates from the release and what's happening in sql server management studio.
- Detects many security vulnerabilities in Lenovo server infrastructurethere are a total of 9 different security holes found in lenovo's server infrastructure.