Overview
Explore DNS hardening techniques and proactive network security measures in this 26-minute conference talk from BSidesLV 2016. Delve into the use of F5 iRules and open-source analysis tools to combat various DNS-based threats. Learn about domain generation algorithms, bad name queries, malformed packets, data exfiltration, and DNS DDoS attacks. Discover how F5 Load Balancing and iRules can be leveraged to enhance security. Gain insights into critical threat notifications, DNS hardening overview, log interfaces, and geolocation. Understand the importance of quick response and the potential consequences of delayed action through real-world examples and case studies.
Syllabus
Introduction
About Jim
Agenda
What happens if you wait
An acquittal attack
Domain generation algorithms
Bad name queries
malformed packets
data exfiltration
DNS DDoS
DNS Natural Flood
F5 Load Balancing
F5 iRules
Putting the Pieces Together
GreatLog
Del
iRules
Critical Threat Notifications
DNS Hardening Overview
Log Interface
Quick Values
Network Operations Center
Span House List
Network compromised
DNS debug data
Geolocation
Taught by
BSidesLV