ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

How the Internet Dodged a Bullet: The KeyTrap Denial-of-Service Attacks against DNSSEC

Автор: Black Hat

Загружено: 2025-05-01

Просмотров: 905

Описание: The Internet relies on the Domain Name System (DNS) for a plethora of its uses, including web browsing, TLS certificates, and email. DNS is critical for today's Internet, so DNSSEC was standardized as one of the first security extensions to any Internet protocol. Until today, DNSSEC has been deployed in about one third of systems.
In this talk we present a new class of devastating attacks on DNSSEC, named KeyTrap, that allow for a comprehensive and continuous DoS of any DNSSEC-validating DNS resolver. The vulnerabilities stem directly from requirements in the DNSSEC standard and we find all DNSSEC-validating resolvers vulnerable. The KeyTrap attacks exploit algorithmic complexity, e.g., in validating signatures against DNSSEC keys, to stall any resolver and DoS its services for all its clients. A single 100 Bytes DNS request can cause a resolver to cease responding for between two minutes and 16 hours, depending on the implementation. With KeyTrap, an attacker could have disrupted service for a large part of global Internet users, which is why leading developers of DNS software referred to KeyTrap as "The worst attack on DNS ever discovered". Exploitation can be achieved from remote and with very low attack traffic volume, making the attack easy to set up, conduct, and keep secretive.
In this talk we show the design of KeyTrap and illustrate its severe impact on DNSSEC-validating resolvers. We give insights into the month-long confidential disclosure process with developers and operators from the industry, including ISC, NLnet Labs, Google, Cloudflare, and Akamai. Finally, we show the arduous process of patching a vulnerability that stems directly from multiple requirements in the Internet standard, illustrating the challenges of creating stable and secure software that intentionally disobeys RFC requirements.

By:
Elias Heftrig | PhD Student, Goethe-Universität Frankfurt, ATHENE
Niklas Vogel | PhD Student, Goethe-Universität Frankfurt, ATHENE
Haya Schulmann | Professor, Goethe-Universität Frankfurt, ATHENE
Michael Waidner | Professor, TU Darmstadt, Fraunhofer SIT, ATHENE

Full Abstract and Presentation Materials:
https://www.blackhat.com/eu-24/briefi...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
How the Internet Dodged a Bullet: The KeyTrap Denial-of-Service Attacks against DNSSEC

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Enhancing Automatic Vulnerability Discovery for Windows RPC/COM in New Ways

Enhancing Automatic Vulnerability Discovery for Windows RPC/COM in New Ways

Black Hat USA 2025 | Autonomous Timeline Analysis and Threat Hunting: An AI Agent for Timesketch

Black Hat USA 2025 | Autonomous Timeline Analysis and Threat Hunting: An AI Agent for Timesketch

What is DNS? (and how it makes the Internet work)

What is DNS? (and how it makes the Internet work)

WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys

WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys

Choose Your Own Investigation: A Live Walkthrough of Modern Browser Threats

Choose Your Own Investigation: A Live Walkthrough of Modern Browser Threats

Black Hat USA 2025 | A Fireside Chat with Cognitive Scientist and AI Expert Gary Marcus

Black Hat USA 2025 | A Fireside Chat with Cognitive Scientist and AI Expert Gary Marcus

Security analysis of Residential Gateways and ISPs: global network domination is (sneakily) possible

Security analysis of Residential Gateways and ISPs: global network domination is (sneakily) possible

WorstFit: Unveiling Hidden Transformers in Windows ANSI!

WorstFit: Unveiling Hidden Transformers in Windows ANSI!

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Сети для несетевиков // OSI/ISO, IP и MAC, NAT, TCP и UDP, DNS

Securing America: Readiness, Response, and Resilience for Critical Infrastructure Defense

Securing America: Readiness, Response, and Resilience for Critical Infrastructure Defense

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Архитектура интернета и веба | Теоретический курс 2026

Архитектура интернета и веба | Теоретический курс 2026

DNSSEC Tutorial

DNSSEC Tutorial

DNS Beyond Basics: 6 записей, которые решают 91% проблем с DNS в рабочей среде!

DNS Beyond Basics: 6 записей, которые решают 91% проблем с DNS в рабочей среде!

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Black Hat USA 2025 | Exploiting DNS for Stealthy User Tracking

Black Hat USA 2025 | Exploiting DNS for Stealthy User Tracking

Black Hat USA 2025 | Advanced Active Directory to Entra ID Lateral Movement Techniques

Black Hat USA 2025 | Advanced Active Directory to Entra ID Lateral Movement Techniques

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Как аналитики SOC на самом деле исследуют сетевой трафик (пошаговый обзор Wireshark)

Как аналитики SOC на самом деле исследуют сетевой трафик (пошаговый обзор Wireshark)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]