From the course: CompTIA Security (SY0-701) Cert Prep: 2 Threats, Vulnerabilities, and Mitigations
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
DNS attacks
From the course: CompTIA Security (SY0-701) Cert Prep: 2 Threats, Vulnerabilities, and Mitigations
DNS attacks
- [Instructor] Earlier in this course, you learned about the important role that the domain name system, DNS, plays on networks. As a reminder, DNS translates the common names that we use on a regular basis, such as linkedin.com or nd.edu to the IP addresses that computers use, such as 108.174.10.10 such as 108.174.10.10 or 34.1.93.237.201. or 34.1.93.237.201. or 34.1.93.237.201. DNS uses a hierarchical lookup system where the initial request goes to a server on the client's network. If that server doesn't already know the answer, it then asks a series of other servers until it finds the one with the correct answer. For example, when looking up www.wikipedia.org, an organization's DNS server first asks the root name server. Now, if the root name server doesn't know the answer, it tells the requester what name server is responsible for the .org top level domain. The client then asks the .org server, who also…
Contents
-
-
-
-
-
-
-
-
-
-
(Locked)
Denial-of-service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Wireless attacks2m 54s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth attacks1m 23s
-
(Locked)
RFID security2m 17s
-
(Locked)
-
-