Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Turning DNS from Security Target into Security Tool

RSA Conference via YouTube

Overview

Explore how DNS servers can be transformed from security targets into powerful security tools in this 44-minute conference talk from RSA Conference. Learn about recent developments that allow for instrumenting DNS servers to implement policies based on domain name and IP address reputation, and utilize DNS telemetry to identify malicious patterns. Discover how malware exploits DNS throughout its lifecycle, understand the implementation of response policy zones for DNS resolution policies, and delve into passive DNS data collection and analytics. Gain insights into DNS tunneling, infiltration techniques, and real-world case studies. Apply this knowledge to enhance your organization's security posture by leveraging DNS as a proactive defense mechanism.

Syllabus

Intro
Most Malware Uses DNS in Attacks
How DNS Is (Ab) Used: Finding a C&C Server
How DNS IS (Ab)Used: Tunneling
DNS Tunneling Example: Infiltration
Actual Photograph of Paul Publishing His Blog
Enter Response Policy Zones
How Response Policy Zones Work
Enter Passive DNS
Passive DNS Databases
Closing the Loop
Case Study: Farsight's NOD Feed
How to Apply What You've Learned Today

Taught by

RSA Conference

Reviews

Start your review of Turning DNS from Security Target into Security Tool

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.