How DNS-Based Attacks Operate from the Inside Out, and Defending Against Them

Logo
Presented by

Moderator: Dan Raywood, Speaker: Gary Cox, Omer Farooq

About this talk

The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents. So how exactly how do cybercriminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS. Key takeaways: • The various phases in the intrusion kill chain and how DNS is used in each phase • The technical mechanisms behind DNS reconnaissance, protocol anomalies, exploits, hijacking, command and control (C&C) communications, DGA threats and more • How DNS-based attacks work—through real word examples, including malware, phishing campaigns, and advanced persistent threats (APTs)
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (599)
Subscribers (44311)
Dedicated to serving the information security community, in person, in print and online.