DNS Cache Poisoning - Computerphile

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ธ.ค. 2024

ความคิดเห็น • 344

  • @t8102690
    @t8102690 4 ปีที่แล้ว +918

    Seeing Dr. Pound's eyes light up every time he mentions filling up some random computer with malware gives me so much energy

    • @snghnishant
      @snghnishant 4 ปีที่แล้ว +10

      😂

    • @talhatariqyuluqatdis
      @talhatariqyuluqatdis 4 ปีที่แล้ว +2

      Hahaha

    • @johnf7332
      @johnf7332 4 ปีที่แล้ว +15

      I just realized the other day I have 200+ samples on my work laptop. It’s all locked-down and [hopefully] can’t execute, but like... I’m kinda hesitant to pick it up now. Lol
      (I study malware, I’m not just a SUPER infected user)

    • @thatguywhowouldnotsharehis2062
      @thatguywhowouldnotsharehis2062 4 ปีที่แล้ว

      @@mrnik.0 00

    • @snghnishant
      @snghnishant 4 ปีที่แล้ว +1

      @@mrnik.0 I think he's currently working in Bioimage analysis.

  • @henrahmagix
    @henrahmagix 4 ปีที่แล้ว +679

    beautiful pen flip at 10:07

    • @khalid5d3
      @khalid5d3 4 ปีที่แล้ว +41

      Now I cant stoping replaying it over and over

    • @TheDevilItSelf
      @TheDevilItSelf 4 ปีที่แล้ว +4

      Just about to write that, now gonna practice that :)

    • @rajiv8k
      @rajiv8k 4 ปีที่แล้ว +21

      @@TheDevilItSelf If you haven't figured it out yet, you need to hold the pen such that it is resting on your middle and ring finger. The thumb rests on the pen such that it is slightly off(towards the index finger) from the pen's center of gravity. Now flick the pen around your thumb with the middle finger and the ring finger.

    • @TheDevilItSelf
      @TheDevilItSelf 4 ปีที่แล้ว +2

      @@rajiv8k thanks dude, thats actually really helpful

    • @jhonbus
      @jhonbus 4 ปีที่แล้ว +2

      I AM INVINCIBLE!

  • @ittvblog
    @ittvblog 4 ปีที่แล้ว +858

    Out of all Computerphile presenters, Dr. Pound, in my opinion, is simply the best! He explanations are bang on and are super easy to grasp. Whenever I see a notification for a video featuring him, I leave everything and start watching it right away.

    • @lythd
      @lythd 4 ปีที่แล้ว +6

      I completely agree

    • @nicolasamodeo475
      @nicolasamodeo475 4 ปีที่แล้ว +8

      Same! He's super entertaining as well. Computerphile please set up playlists categorized by nottingham staff!

    • @bsvenss2
      @bsvenss2 4 ปีที่แล้ว +3

      Totally agree. He’s explaining these things better than anyone else.

    • @klyanadkmorr
      @klyanadkmorr 4 ปีที่แล้ว +6

      His name MIKE POUND is Sooo James Bond character name=PUSSY GALOR

    • @bananya6020
      @bananya6020 4 ปีที่แล้ว +4

      *bang* on for doctor *pound*

  • @treyquattro
    @treyquattro 4 ปีที่แล้ว +25

    Dr. Mike Pound's enthusiasm for knowledge is infectious

    • @maxien101
      @maxien101 ปีที่แล้ว

      Truly. I actually started to learn to code watching his videos. Not from them ofc, but the motivation originated heree

  • @KSigWyatt
    @KSigWyatt 4 ปีที่แล้ว +7

    No matter what the subject, I always find myself learning something new from
    Dr. Pound.

  • @trudyandgeorge
    @trudyandgeorge 3 ปีที่แล้ว +32

    Rest in peace, Dan Kaminsky

  • @adventurer2395
    @adventurer2395 ปีที่แล้ว +2

    Major props for making this video despite the earthquake you guys were experiencing.

  • @dexterman6361
    @dexterman6361 4 ปีที่แล้ว +37

    It's also important to note that DNS happens over UDP (stateless) so there's no 'connection' to check the response against. For example, in TCP, participating computers establish a connection, and the only response for the request that was sent out is accepted by the requesting server.

  • @_PsychoFish_
    @_PsychoFish_ 4 ปีที่แล้ว +133

    Me: I have to get up early tomorrow.
    Dr. Mike Pound: Wanna know something about DNS Cache Poisoning?
    Me: Tell me everything!
    #sleepis4theweak
    oh and nice pen flip at 10:07

  • @NickHobbs
    @NickHobbs 4 ปีที่แล้ว +2

    I studied computer science about 30 years ago, and would have loved to have had a professor like him. I remember buying my first computer magazine about 1980 aged about 7 and being amazed. I used every penny of my pocket money to buy as many magazines and books as I could up until the age of about 17.
    Computers were a different beast then, and the challenges were very different, but I LOVE watching these videos (I no longer program computers) - and I'm in awe of you guys.

  • @raymondnozomi1657
    @raymondnozomi1657 3 ปีที่แล้ว +4

    I really like how he says something and it souds like it's insanely fun. And simple enough for almost anyone to understand.

  • @rich1051414
    @rich1051414 4 ปีที่แล้ว +79

    Name server poisoning also happened occasionally on accident, due to responding accidently with an incremented query id, possibly poisoning some later random request. Also, if a DNS has DNS level blocking taking place, and it is treated like an authoritative DNS server, it may 'black hole' your request. As in, send you an IP that is invalid and leads no where. This happened to google servers a while back when they accidentally had china servers listed as authoritative, which was causing global traffic to get black holed due to china censorship.

  • @grayhat_9x
    @grayhat_9x 4 ปีที่แล้ว +91

    I see Dr. Pound and I like first, then watch

    • @SinanAkkoyun
      @SinanAkkoyun 4 ปีที่แล้ว +3

      who are you talking to? That's how it works.

  • @makkurotatsu
    @makkurotatsu 3 ปีที่แล้ว +1

    Thanks for explaining the subject in an easy to understand manner. The next time a client of mine tells me that my recommendation of implementing DNSSEC is "overkill" and "too expensive", I shall point them to this video.

  • @riotmakerzify
    @riotmakerzify 4 ปีที่แล้ว +30

    We asked and we received! 🙏🏼

  • @UsmanAR
    @UsmanAR 4 ปีที่แล้ว +7

    I was looking forward to this video and as always its amazingly explained by Dr.Mike. I couldn't keep it as he left us with a cliffhanger in the last DNS video and searched about it but still his explanation gave me a better and clear understanding of it.. Love his way of teaching

  • @dbtechprojects2392
    @dbtechprojects2392 4 ปีที่แล้ว +4

    The best presenter, I owe so much of my knowledge to this guy and this channel, glad these videos keep coming out !

  • @itayshtainberg7408
    @itayshtainberg7408 4 ปีที่แล้ว +75

    It's kind of surprising to hear that most of the global DNS system is not secured with certificates/TLS. Thanks for the great video!

    • @SupaKoopaTroopa64
      @SupaKoopaTroopa64 4 ปีที่แล้ว +13

      It's actually quite terrifying, even if a poisoning attack only has like 1/1,000,000,000% chance of working.

    • @cosmicrider5898
      @cosmicrider5898 4 ปีที่แล้ว +1

      Certbot takes like two to three lines of code lol

    • @Cynyr
      @Cynyr 4 ปีที่แล้ว +2

      @@cosmicrider5898 It's not the name server that is the "hard" part. You can turn that on with the config file on most name servers these days. It's convincing accounting that spending 100,000/yr on the signed certificate is "worth it". Is your ISP really going to pay for that? What if they have to buy a dozen for various bits of their country wide network? Is your work going to buy one for their server? for each branch (yes there are ways around this at the corporate level, but if you have 2 or 3 small offices)?

    • @snmp1612342
      @snmp1612342 4 ปีที่แล้ว +1

      This is a chicken and egg issue, without DNS the common name of X509 certificates could not provide the information where a certificate would fit in a global hierarchy so you wouldn't know what to validate it against. This is an issue solved by DNSSEC in a different way that still provides compatibility with regular DNS while maintaining its scalability.

    • @snmp1612342
      @snmp1612342 4 ปีที่แล้ว +5

      @Bjorn While that might be true for some ISPs the real reason is that nobody thought about protecting against eavesdropping at the time DNS was invented and it is in such ubiquitous use today that nobody reinvented a perfect enough replacement yet. There are lots of interoperability and scalability issues to solve for any such replacement.

  • @demonicious_
    @demonicious_ 4 ปีที่แล้ว +25

    Of course Dr. Mike Pound would say that a hacking attack has a "cool" name and is a very "cool" kind of attack.

  • @BilgeKarga1
    @BilgeKarga1 4 ปีที่แล้ว +14

    Now i won't have to go to tons of lessons in school to learn this thanks to computerphile🤙

  • @omicronpersei
    @omicronpersei 4 ปีที่แล้ว +13

    Well explained as usual. But I kept wondering why name servers don’t simply only accept each query ID from the IP address of the authoritative server they sent the query ID to.
    I found out the reason is that with UDP you can spoof the source IP

  • @dropcake
    @dropcake 4 ปีที่แล้ว +4

    I learned more about DNS in your DNS video and this video than I did in my grad network security course.

  • @lesluna34
    @lesluna34 4 ปีที่แล้ว +63

    As a reptile owner: WHAT'S IN THE BOX!!!!!!

    • @juliankandlhofer7553
      @juliankandlhofer7553 4 ปีที่แล้ว +17

      a snake. he showed at the end of the last dns video

    • @DominusTerrae
      @DominusTerrae 4 ปีที่แล้ว +5

      A Cornsnake to be precise

    • @bentoth9555
      @bentoth9555 4 ปีที่แล้ว +10

      The answer is always Gwyneth Paltrow's head.

    • @ACupOfKerba
      @ACupOfKerba 4 ปีที่แล้ว

      I had the same question

    • @giovannicabrini8457
      @giovannicabrini8457 4 ปีที่แล้ว +1

      @@bentoth9555 I read the question with Jack's voice lol

  • @kvelez
    @kvelez 2 ปีที่แล้ว +1

    0:10
    Domain Name System
    0:32
    Poisoning.
    1:01
    DNS
    3:17
    How it works.
    4:29
    Cache poisoning.
    6:06
    Botnet.
    10:08
    Security

  • @codelog2742
    @codelog2742 4 ปีที่แล้ว +1

    That pen flick tho... OMW!!!
    This definitely makes Dr. Pound the best Computerphile ;)

  • @Farhadk1989
    @Farhadk1989 3 ปีที่แล้ว

    Since Facebook was down yesterday, couldn't that have been the best time for someone to try something like this.

  • @lifeisstr4nge
    @lifeisstr4nge 2 ปีที่แล้ว +1

    10:07 beautifully choreographed pen-spin flex by Dr. Mike

  • @Number_055
    @Number_055 4 ปีที่แล้ว +16

    I encountered a sysadmin on the internet who used a kind of client side DNS cache poisoning as a security feature. Apparently bots scanning IP addresses for webservers is an extremely common thing. His solution to this was to run his webserver on an unusual port, then reply to all requests to his IP on the default HTTP ports with a HTTP 301: Permantently Moved error, with the TTL set to 1000 years. The result was that anyone who tried to connect to his webserver without a DNS telling them the correct port would have their local DNS cache updated to effectively permanently redirect all further attempts to connect to his site to a different site. This reportedly resulted in a dramatic drop of connection attempts from bots.

    • @Roxor128
      @Roxor128 4 ปีที่แล้ว +1

      That's pretty devious. I love it!

    • @lake5044
      @lake5044 4 ปีที่แล้ว +1

      I don't get it. But what about the local cache? Every browser that already had a DNS cache will then be permanently blocked (since the browser will never attempt to clear a 301 redirect cache automatically).

    • @Roxor128
      @Roxor128 4 ปีที่แล้ว

      @@lake5044 Could be a problem with existing users, but might be able to be worked around by having the bot trap serving up a page saying "If you're seeing this, your browser's DNS cache is outdated. Clear it and try revisiting the site." which the bots will never actually read.

    • @lake5044
      @lake5044 4 ปีที่แล้ว

      @@Roxor128 But then, that's no different than doing the same from your server (i.e. presenting some bot-challenge). I don't see the added benefit from going to such lengths as to purposefully poison your own domain name (maybe some load balancing? But standard load balancing is still much preferred and robust I think)

    • @lake5044
      @lake5044 4 ปีที่แล้ว

      @Zero Cool What do you mean by "upload more RAM from the cloud"?

  • @arcadesunday4592
    @arcadesunday4592 4 ปีที่แล้ว +2

    Fascinating, and quite a scary prospect. 10:08 - Top class pen trick...

  • @SleeveBlade
    @SleeveBlade 4 ปีที่แล้ว +13

    yay, professor Pound again!!

  • @woutvansteenkiste8464
    @woutvansteenkiste8464 4 ปีที่แล้ว +7

    The smooth pen movement on 10:07

  • @waasar
    @waasar 4 ปีที่แล้ว +9

    I have only been lead to a single login spoofing website recently, but when it was more prevalent years ago it always amazed me how bad or lazy their developers used to be at their job. Most pages were so far off the original that they could only hope to trick the most gullible users.

    • @nielsdegroot9138
      @nielsdegroot9138 4 ปีที่แล้ว

      With relatively low costs, it only takes a few suckers to become profitable.

  • @FlashMeterRed
    @FlashMeterRed 4 ปีที่แล้ว +6

    I would love someone to take one of Mike's videos and just superimpose a ghost hand touching his arm every time he lifts his arm to stretch his sleeve out.
    You can't unsee it now

    • @shmunkyman33
      @shmunkyman33 4 ปีที่แล้ว +1

      I noticed this a while ago and have been wondering if anyone else saw it haha. I hope if he sees this comment he knows it's not a bad thing or that I'm making fun, it's just a cute little quirk!

  • @orion7311
    @orion7311 4 ปีที่แล้ว +2

    I wish my college professors explained topic like this, I would have been more interested in studying. Topics covered here are more easier to understand, even though I didn't do CS in college.

  • @supernunb3128
    @supernunb3128 4 ปีที่แล้ว +5

    Very interesting and well explained, Dr. Pound! I'm kind of curious now though, what's the timeline of when all these different types of attacks and/or defenses started popping up? When did cybersecurity start becoming such a big issue?

  • @sebastiansimon7557
    @sebastiansimon7557 ปีที่แล้ว

    It feels weird to re-watch Computerphile videos that I already watched years ago for entertainment, but this time because I’m writing a computer science bachelor thesis about DNS security (specifically about the identity management for DANE).

  • @Nach2022SindAlleRussischeBots
    @Nach2022SindAlleRussischeBots 4 ปีที่แล้ว +2

    Just today I wrote an exam on distributed systems and security. This video is two days late!
    (But awesome in every other way)

  • @ibarvasquez
    @ibarvasquez 2 ปีที่แล้ว

    Thanks for sharing knowledge ! 👍 Greetings from La Paz Bolivia 🇧🇴

  • @mheboobkhan9126
    @mheboobkhan9126 4 ปีที่แล้ว +4

    Ahhh...DNS cache poisoning ,I know everything about it
    Dr.Pound : come here mate !!!👀

  • @kristoffseisler2163
    @kristoffseisler2163 4 ปีที่แล้ว +1

    thank god i was just thinking about this since the last video about dns

  • @walkieer
    @walkieer 4 ปีที่แล้ว

    Is the exploit kit he talks about at 5:56 real? Like if you accidentally visited a bad website you'll get infected. Assuming you don't have flash installed.

  • @ejonkus5828
    @ejonkus5828 3 ปีที่แล้ว

    Notice the chosen sharpie pens. They closely match the colours of the surrounding objects.

  • @juliankandlhofer7553
    @juliankandlhofer7553 4 ปีที่แล้ว +9

    Would DNS over TLS be a solution to this issue?

    • @cosmicrider5898
      @cosmicrider5898 4 ปีที่แล้ว +5

      I think dnssec would be a better solution. I believe tls or doh could still be poisoned.
      Edit: he says this at 10:12

    • @juliankandlhofer7553
      @juliankandlhofer7553 4 ปีที่แล้ว +1

      if the connection between the client and server is encrypted, there's no opportunity to send a spoofed response, since you'd need to crack the encryption to send a response on that specific request, right?
      dnssec just takes this a step further with trusted dns servers

    • @zemerick1
      @zemerick1 4 ปีที่แล้ว +2

      DNSSEC is the answer, not DNS over TLS. However, if the server isn't supporting DNSSEC which a LOT do not, or it not enabled. . .then it's game on.

    • @agoatmannameddesire8856
      @agoatmannameddesire8856 4 ปีที่แล้ว +1

      @@juliankandlhofer7553 The opportunity would be to MITM the client recursive name server, which could be easier or harder depending on the privacy profile (opportunistic or out-of-band key-pinned, see RFC7858 section 4).

    • @YourTVUnplugged
      @YourTVUnplugged 4 ปีที่แล้ว

      @@cosmicrider5898 You're only partially correct, because who decides who is a 'trusted' domain name server? If you trust anyone to be that 'trusted' party, then by default you can no longer trust them. Anyone who gains that must trust is immediately untrustworthy, lol... That's the facts of life. What you need is DN SEC where we trust individual domains by their public keys which only they have the private key for... Where we dont trust domain name servers but we trust individual domains proving who they are themselves. We can't trust any central authority to give us the truth, because with that trust they will always use it to lie. Instead we have to determine the individuals that we trust and only rely on our own ability to verify they are who they say they are and if we believe or better yet know we can trust them. G000gle is not to be trusted they can't even let TRUE information not be censored due to pharmaceutical interest for people to believe something that is true is not true... Because if people believe something that is true is not true then they equal big money for the pharmaceutical companies, and if they know the truth that money is greatly diminished. These companies aren't out for our best interests but for their own and their friends.

  • @qm3ster
    @qm3ster 2 ปีที่แล้ว +1

    Any ideas on how Tor V3 hidden services can start getting nicer names? Some kind of ring of trust situation?

  • @ТеодорПетровић-о3л
    @ТеодорПетровић-о3л 4 ปีที่แล้ว +1

    I love spiderman teaching me about networking

  • @LalliOni
    @LalliOni 4 ปีที่แล้ว

    Watching Mike pounding out these drawings, improving them a bit and not worrying about being perfect is kind of relaxing. Bob Ross as an excited hacker!

  • @MrArani
    @MrArani หลายเดือนก่อน

    The pen twirl at time stamp 10:07 is epic!!!

  • @davidk4682
    @davidk4682 4 ปีที่แล้ว

    Awesome video !!!! Love the animation, so helpful !!! Job well done sir.

  • @flamablegas6308
    @flamablegas6308 3 ปีที่แล้ว +1

    Do mobile applications fetch to their sites to work? If so then shouldn't they be vulnerable as well?

  • @rand.virk.automationvirk8537
    @rand.virk.automationvirk8537 ปีที่แล้ว

    1:54 this is how excited I want to be when talking about anything

  • @stealthemoon8899
    @stealthemoon8899 4 ปีที่แล้ว +2

    Yo, I've been wondering if this could happen! Great video!

  • @mindright9771
    @mindright9771 4 ปีที่แล้ว

    Good explanation of how DNS injection works. Hard to believe DNS servers aren't using certificates until now though. You'd think someone would have figured this out a long time ago, especially given the popularity of SQL injection vulnerabilities and the like that have been used to deliver payloads in databases for years.

  • @Luftbubblan
    @Luftbubblan 4 ปีที่แล้ว +1

    Is the querry spam the reason why this "attack" is so slow? I have used this kind of attacks in lack of other ways to redirect traffic(And problems with finding captive portals that works) on my own network but i don't find it to work that well :/
    Iv'e tried this multiple times over the years but never found anything that works well so i end up giving up every time hehe.

  • @scotttroyer
    @scotttroyer 4 ปีที่แล้ว

    That casual sharpie spin at 10:07

  • @gram.
    @gram. 4 ปีที่แล้ว

    I really like the way this guy talks for some reason, I don't know why though

  • @Tobias-nv3dx
    @Tobias-nv3dx 4 ปีที่แล้ว +1

    Why dont they simply check if the IP of the one answering is the IP they asked? And wont the Recursive resolver still receive the correct answer a moment later? Couldnt one at least use the second answer to invalidate the cache?

  • @mo99
    @mo99 4 ปีที่แล้ว +1

    Sir Dr Pound, I’d love some explanation on what happened with the Garmin ransomware a few days back

  • @hansisbrucker813
    @hansisbrucker813 4 ปีที่แล้ว

    Great video. 👍
    Could you cover "port knocking"?

  • @Grejtcz
    @Grejtcz 4 ปีที่แล้ว +3

    What exactly is multicast dns and .local domain?

    • @snmp1612342
      @snmp1612342 4 ปีที่แล้ว +1

      Apple Bonjour and Zeroconf use multicast DNS. Basically how this works is your devices for example Google Chromecast periodically sends a DNS packet to a multicast address that gets broadcast to all devices connected to your LAN or those who subscribed to said multicast address saying 'I am a chromecast, you can use my services x, y. and z at IP address such and such'. The .local Top Level Domain is one reserved for private usage - for example on your LAN - and will not be resolvable in the internet. Avahi (Linux) would be one example of a zeroconf implementation making use of the .local TLD.

    • @Mr.Leeroy
      @Mr.Leeroy 4 ปีที่แล้ว

      do not use .local unless you know what you are doing

  • @jadedFk
    @jadedFk 4 ปีที่แล้ว

    Thanks Jarrod! Great vid.

  • @kerber63
    @kerber63 3 ปีที่แล้ว

    That spin at 10:06 is lit

  • @ayush.kumar.13907
    @ayush.kumar.13907 4 ปีที่แล้ว +1

    please also explain DNS over HTTP?

  • @rajeshprajapati1851
    @rajeshprajapati1851 4 ปีที่แล้ว +1

    Thanks for the great explanation. He's great !!!

  • @xHaste
    @xHaste 3 ปีที่แล้ว

    RIP Kaminsky, who passed just 2 weeks ago.

  • @sagetechnology4913
    @sagetechnology4913 4 ปีที่แล้ว

    on a related note with the Lancache game download cache service, you have to purposely poison your dns cache, so that when a user wants to download a game that's already downloaded, it gets the game from the server hosting the service, rather than the internet.

  • @ipadluki47
    @ipadluki47 4 ปีที่แล้ว +11

    talk about websockets

  • @JasonfromEarth
    @JasonfromEarth 4 ปีที่แล้ว +4

    I'm using DNSSEC via Cloudflare on my Piehole. Highly recommend it.

  • @SAMathlete
    @SAMathlete 2 ปีที่แล้ว

    Wow. The internet is held together with duct tape and twine. It is crazy that the early internet even worked at all without security measures like public key cryptography.

  • @hko2006
    @hko2006 4 ปีที่แล้ว +2

    0:44 *China Great Firewall: Let me introduce myself*

  • @eseseis7251
    @eseseis7251 4 ปีที่แล้ว +1

    i will be using DNS for comunication trough dns resolv messages. is a simple project, but with great potential.
    im curious whats gonna happen when i point 2Dns servers to resolve eachother, each other beeing the others dns server, but beeing dns server itself.

    • @cameron7374
      @cameron7374 4 ปีที่แล้ว

      My guess: They just start sending every request that comes in round forever until both name servers become unresponsive because all they do is send queries to each other.

    • @Mr.Leeroy
      @Mr.Leeroy 4 ปีที่แล้ว

      @@cameron7374 Have you got no hope at all in people who designed such fundamental service?

    • @cameron7374
      @cameron7374 4 ปีที่แล้ว

      @@Mr.Leeroy I do have hope in them but if the specification says to ask the next DNS server if you don't know and they both point at each other, that is what will happen and not a flaw in the technology but rather user error. I mean, something like this can already happen with some routing protocols for regular routers where they establish a path that leads in a circle, in the hopes the next router knows where to send the packets. That's called a broadcast storm and it's the job of whoever is setting up the network to set it up in a way where it doesn't happen.

  • @nitzanyemini
    @nitzanyemini ปีที่แล้ว

    this is so interesting. thank you!

  • @LastStar007
    @LastStar007 2 ปีที่แล้ว

    2:26 That's a real Parker Square of a Jolly Roger.

  • @rujotheone
    @rujotheone 4 ปีที่แล้ว

    Please could someone explain that Dan Kaminsky trick?

  • @alexanderdavis1047
    @alexanderdavis1047 2 ปีที่แล้ว

    What are your favorite pieces of literature that has helped your career and in teaching over the years?

  • @pruthalikhankar4427
    @pruthalikhankar4427 4 ปีที่แล้ว

    Hello,
    Just to say that the content you guys put forth is so much helpful in many ways.. masters really!!
    Only thing is sometimes its difficult to understand what they say ... myself not quite familiar with the accent ...
    please kindly make captions/subtitles available... it will help us to understand better ... Thanks in advance

  • @play_sports_and_read_books
    @play_sports_and_read_books 4 ปีที่แล้ว

    So what exactly happens when we change the DNS id on out phone (eg: change it to 1.1.1.1 instead of what was there before, which is the dns for cloudflare. But still what does that mean or do?)

    • @Michael-sh1fb
      @Michael-sh1fb 4 ปีที่แล้ว

      It is skimmed over in this video but if you watch the other DNS explanation, that IP is the IP of the first DNS server you will ask (which in turn may ask other DNS servers)

  • @webjunkienl
    @webjunkienl 4 ปีที่แล้ว

    What if you're running your own recursive dns like unbound?

  • @pcbona
    @pcbona 4 ปีที่แล้ว

    What i dont understand about this DNS Cache Poisoning is: If my DNS resolver asks an outside DNS server to resolve for fish.google.com, it talks to an IP address of the public DNS lets say 1.1.1.1. If then a malocious answer with the correct querryID comes in, it likely wont have the correct source IP as the device probably sits within your local network. Im guessing the DNS resolver does check this while receiving responses. So is there source IP spoofing going on as well for this attack?

  • @CH-4
    @CH-4 4 ปีที่แล้ว +1

    Dr Mike should have his own youtube channel ( i'm talking about Dr Mike the computer guy )

    • @Michael-sh1fb
      @Michael-sh1fb 4 ปีที่แล้ว

      thx for the clarification

  • @noahwolton7662
    @noahwolton7662 4 ปีที่แล้ว

    Is there no way to send the poisoned dns query on all ports at once?

  • @Br3ttM
    @Br3ttM 2 ปีที่แล้ว

    Just based on your other videos, why don't these requests between DNS servers use token like when browsers are talking to websites? Just send a request for the IP address, plus a random string, and only accept it if the response matches? They could easily have turned that 16 bits into 16 or more bytes. Did they just not see a need for any form of security when saying what address a site is at?

  • @johnwatt9853
    @johnwatt9853 4 ปีที่แล้ว

    Hello, the NS will receive a malicious answer from a different IP than the one that used for the query, right? Why will it accept it?

    • @nielsdegroot9138
      @nielsdegroot9138 4 ปีที่แล้ว +1

      That is an option you can enable in at least some DNS servers, and could even be a default setting. But it takes time/processing power to check, reducing throughput.
      In the early days of the internet the standards weren't created with lots of security built in. By now we've learned and there is more thought put in to the security of newer standards or changes to existing standards to make them more secure. But lots of newer and more secure features are optional, because of the unwillingness to break backwards compatibility with older devices/software.

  • @fleshwere
    @fleshwere 4 ปีที่แล้ว

    How much bandwith would one need to hijack the current randomizing defence. Anyone calculated that?

  • @ACupOfKerba
    @ACupOfKerba 4 ปีที่แล้ว

    Important question. What is in the vivarium?

  • @frency5671
    @frency5671 2 หลายเดือนก่อน

    Thank you.

  • @DIY4Profit
    @DIY4Profit ปีที่แล้ว

    So a fortigate FW/router that is using https but with no certificate could fall into this attack?

  • @stag1739
    @stag1739 2 ปีที่แล้ว

    I was just looking up how to flush a dns cache and this popped up thanks desperate storage saving me

  • @mohammedsharukh2310
    @mohammedsharukh2310 4 ปีที่แล้ว

    Can DNS cache poisoning cause incorrect certificate to be served/seen in the browser ?

  • @30092001
    @30092001 2 ปีที่แล้ว

    how you find a dns poisonous computer in the network ? how can i detect it ?

  • @sent4dc
    @sent4dc 4 ปีที่แล้ว

    My registrar supports DNSEC. But what are the downsides of enabling it though? (because it's off by default.)

    • @YourTVUnplugged
      @YourTVUnplugged 4 ปีที่แล้ว

      The downside WHICH IS MAJOR is that you're trusting a untrustworthy third party to vet your domains instead of yourself. Only we can trust who we communicate and make network transactions with, a third party will 100% of the time LIE TO US.

  • @KostasKolias
    @KostasKolias ปีที่แล้ว

    I believe DNSSEC doesn't rely on PKI and therefore certificates as it is mentioned in the video.

  • @donaldhobson8873
    @donaldhobson8873 4 ปีที่แล้ว

    Why not make the query ID 64 bits, or more?

  • @MovingThePicture
    @MovingThePicture 4 ปีที่แล้ว

    Do you also have to do IP spoofing?

  • @bojandude
    @bojandude 4 ปีที่แล้ว

    Since a majority of TLS certificate issuance systems rely on DNS verification to prove ownership of a domain, could you not also issue yourself valid certificates for the domain you have poisoned? Then, combined with the DNS sending people to your site, you also have browsers validating the server is legitimate?

    • @Cynyr
      @Cynyr 4 ปีที่แล้ว

      no, because in general those certificates are signed by a central authority, and since you don't have their key you can't sign your own certificate. So if you were paying attention to your browser, it would complain that the site isn't signed. Chrome does this very aggressively these days.

  • @DanielKarbach
    @DanielKarbach 4 ปีที่แล้ว

    Dan Kaminsky is awesome, great talker!

  • @QuwertzuiopGreenSky
    @QuwertzuiopGreenSky 4 ปีที่แล้ว

    but why does it even accept the response if it comes from another ip then the request where send to?

  • @xBZZZZyt
    @xBZZZZyt 4 ปีที่แล้ว +2

    encrypted DNS?

    • @YourTVUnplugged
      @YourTVUnplugged 4 ปีที่แล้ว +1

      You wonder why they wouldn't even mention it! Wonder no more... This is controlled pieces of information, they don't want you to know all you need to know.

  • @asharbinkhalil
    @asharbinkhalil 3 ปีที่แล้ว

    hy fellas,
    how can i make a virus that just change cache of dns without that process of malicious server response? is this practical?

  • @Vlfkfnejisjejrjtjrie
    @Vlfkfnejisjejrjtjrie 4 ปีที่แล้ว +2

    I haven't seen that kind of printer paper since the 80's

    • @donovanwray5974
      @donovanwray5974 4 ปีที่แล้ว

      Still for sale at Staples.

    • @MartinMaat
      @MartinMaat 3 ปีที่แล้ว

      I imagine that university they work has a sub-optimal purchasing process and they ended up with piles of boxes of the stuff at a time no one was using it anymore. Now every employee is using it as scribbling paper for centuries to come. The editor even used an image of it as a surface for an animation which was funny.

  • @Caneladorada
    @Caneladorada 4 ปีที่แล้ว

    I'm concerned about the computer apocalypse when quantum computers are powerful enough. The encryption and randomization methods are going to be fairly easy to crack