The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents.
So how exactly how do cyber-criminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS.
Key takeaways:
- The various phases in the intrusion kill chain and how DNS is used in each phase
- The technical mechanisms behind DNS reconnaissance, protocol anomalies, exploits, hijacking, command and control (C&C) communications, DGA threats and more
- How DNS-based attacks work—through real word examples, including malware, phishing campaigns, and advanced persistent threats (APTs)