DNS Hardening - Proactive Network Security Using F5 iRules and Open Source Analysis Tools

DNS Hardening - Proactive Network Security Using F5 iRules and Open Source Analysis Tools

BSidesLV via YouTube Direct link

Agenda

3 of 26

3 of 26

Agenda

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

DNS Hardening - Proactive Network Security Using F5 iRules and Open Source Analysis Tools

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 About Jim
  3. 3 Agenda
  4. 4 What happens if you wait
  5. 5 An acquittal attack
  6. 6 Domain generation algorithms
  7. 7 Bad name queries
  8. 8 malformed packets
  9. 9 data exfiltration
  10. 10 DNS DDoS
  11. 11 DNS Natural Flood
  12. 12 F5 Load Balancing
  13. 13 F5 iRules
  14. 14 Putting the Pieces Together
  15. 15 GreatLog
  16. 16 Del
  17. 17 iRules
  18. 18 Critical Threat Notifications
  19. 19 DNS Hardening Overview
  20. 20 Log Interface
  21. 21 Quick Values
  22. 22 Network Operations Center
  23. 23 Span House List
  24. 24 Network compromised
  25. 25 DNS debug data
  26. 26 Geolocation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.