Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

DNS Server Cache Snooping Remote Information Disclosure

Posted on 2011-03-01
5
Medium Priority
?
2,255 Views
Last Modified: 2012-06-27
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set. This may allow a remote attacker to determine which domains have recently been resolved via this name server, and therefore which hosts have been recently visited. For instance, if an attacker was interested in whether your company utilizes the online services of a particular financial institution,
they would be able to use this attack to build a statistical model regarding company usage of that financial institution. Of course, the attack can also be used to find B2B partners, web-surfing patterns,
external mail servers, and more.
Note: If this is an internal DNS server not accessable to outside networks, attacks would be limited to the internal network. This may include employees, consultants and potentially users on a guest network or WiFi connection if supported.

Please provide your recommendations
0
Comment
  • 3
  • 2
5 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 2000 total points
ID: 35005624
0
 

Author Comment

by:Yogesh_Exchange_Expert
ID: 35005763
Actually i got this query from some one else can you please explain what is this risk in simple words
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 35005790
Is this internal or external DNS server(s) ?

Krzysztof
0
 

Author Comment

by:Yogesh_Exchange_Expert
ID: 35005847
internal DNS with windows server 2003. any thing we can suggest to make it secure.
0
 

Author Closing Comment

by:Yogesh_Exchange_Expert
ID: 35005921
ok
0

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question