SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
DQB – DNS Query Blocker
Kunio Miyamoto
Twitter: @wakatono
Facebook: www.facebook.com/wakatono
1Copyright by Kunio Miyamoto
DQB – DNS Query Blocker
(in fact, fakes DNS response
rather than blocking DNS query)
Kunio Miyamoto
Twitter: @wakatono
Facebook: www.facebook.com/wakatono
2Copyright by Kunio Miyamoto
Introduce myself☺
It’s a Joke ☺
Copyright by Kunio Miyamoto 3
A member and session chair of
Kyoto 2012 FIRST TC Committee
Phishing makes malicious sites
like a real service sites.
Copyright by Kunio Miyamoto 4
Reference:
http://www.atmarkit.co.jp/fsecurity/special/65phishing/phishing01.html
MITB viruses inject malicious
forms to real contents
Copyright by Kunio Miyamoto 5
Reference: http://www.smbc.co.jp/security/popup.html
Common Spec:malicious hosts
exist
• Attacker prepares the host to receive data
of victims’ like banking information.
• Most of malicious host has own FQDN
• IP addresses is changed due to their
lifecycle
– Stopping access to malicious hosts that have
fixed IP addresses is easy due to many
technology to take down.
Copyright by Kunio Miyamoto 6
Modern Attacks triggered by
Web Access
Copyright by Kunio Miyamoto 7
Which is better, left “Google” or right “Google” ?
Both sites are better(correct) web site ☺
How to avoid accessing to
malicious host?
• HTTP/HTTPS Proxy Server access block
by using Blacklist
– Load of Proxy Rises Up!
• Takedown by ISP and Various Service
Provider
– Sometimes Long Term discussion is needed
• Temporarily:
– Stop by using DNS fake response
• I assume this to use edge network(fake response
from nearest DNS Cache Server)
Copyright by Kunio Miyamoto 8
How to make DNS fake
response?
Copyright by Kunio Miyamoto 9
1. Capture DNS request
2. Decide whether the response
of captured request must be
faked or not.
3. Get Request ID,
Source IP/PORT,
Destination IP/PORT,
and request content.
4. Make Fake Response Packet
from information of 2
5. Send fake response to clinet
as soon as possible!
Concept Diagram
Copyright by Kunio Miyamoto 10
Proof of Concept:
Copyright by Kunio Miyamoto 11
About
1ms
1ms from request packet is captured
to response packet (faked) is captured
Normal Request/Response
Copyright by Kunio Miyamoto 12
about 10ms from request packet is captured
to response packet (faked) is captured
I defeated the real DNS response speed ☺
DNS Response
Chicken Race!
Name Resolution Step
interfared by DQB:
• 1. DNS Request is sent by client
• 2. Fake DNS Response is sent by DQB
• 3. Real DNS Response is sent by DNS
Cache
Copyright by Kunio Miyamoto 13
One Request for Two Response!
Now in progress of this research
• I’m developing and evaluating the concept
of DNS Query Blocker
– To use linear search for finding DNS query to
fake response spends 1ms for searching
10000 hosts to be blocked
• Ideas for more(for example):
Counter to fake response related to the
request of domain name generated by
DGA(Domain Generation Algorithm)
Copyright by Kunio Miyamoto 14
What we call “Future Work” ☺
LIMITATION!
• Of course, this mechanism is not suitable
for faking DNS response signed by
DNSSEC mechanism.
Copyright by Kunio Miyamoto 15
Copyright by Kunio Miyamoto
Thank you!
@wakatono
If possible, any questions are welcome via email
or Twitter. Of course, in banquet or any
networking time ☺
Special thanks to:
My friends (they are illustrator in Japan)
16

Weitere ähnliche Inhalte

Ähnlich wie Dqb@first ac 2013_lt

DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)Fatima Qayyum
 
DDosMon A Global DDoS Monitoring Project
DDosMon A Global DDoS Monitoring ProjectDDosMon A Global DDoS Monitoring Project
DDosMon A Global DDoS Monitoring ProjectAPNIC
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysiscodefortomorrow
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!ThreatReel Podcast
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointZack Meyers
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareFelipe Prado
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016Earl Carter
 
DNS Rebinding Attack
DNS Rebinding AttackDNS Rebinding Attack
DNS Rebinding AttackFelipe Japm
 
Adversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC HoneypotAdversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC HoneypotA. S. M. Shamim Reza
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructureWP Engine
 

Ähnlich wie Dqb@first ac 2013_lt (20)

DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
 
DDosMon A Global DDoS Monitoring Project
DDosMon A Global DDoS Monitoring ProjectDDosMon A Global DDoS Monitoring Project
DDosMon A Global DDoS Monitoring Project
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 
hacking.ppt
hacking.ppthacking.ppt
hacking.ppt
 
2hacking.ppt
2hacking.ppt2hacking.ppt
2hacking.ppt
 
DNS Rebinding Attack
DNS Rebinding AttackDNS Rebinding Attack
DNS Rebinding Attack
 
Adversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC HoneypotAdversary Pattern Analysis - A Journey with APNIC Honeypot
Adversary Pattern Analysis - A Journey with APNIC Honeypot
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructure
 
Hacking
HackingHacking
Hacking
 

Mehr von Kunio Miyamoto, Ph.D.

これからのセキュリティ人財を考える(仮) 2015年版
これからのセキュリティ人財を考える(仮) 2015年版これからのセキュリティ人財を考える(仮) 2015年版
これからのセキュリティ人財を考える(仮) 2015年版Kunio Miyamoto, Ph.D.
 
TBD - To Block Connection from Suspicious IP addresses by using "DICE"
TBD - To Block Connection from Suspicious IP addresses by using "DICE"TBD - To Block Connection from Suspicious IP addresses by using "DICE"
TBD - To Block Connection from Suspicious IP addresses by using "DICE"Kunio Miyamoto, Ph.D.
 
講義資料(公開用)
講義資料(公開用)講義資料(公開用)
講義資料(公開用)Kunio Miyamoto, Ph.D.
 
Joyful assembly language - Assembly Language Tanka
Joyful assembly language - Assembly Language TankaJoyful assembly language - Assembly Language Tanka
Joyful assembly language - Assembly Language TankaKunio Miyamoto, Ph.D.
 

Mehr von Kunio Miyamoto, Ph.D. (10)

これからのセキュリティ人財を考える(仮) 2015年版
これからのセキュリティ人財を考える(仮) 2015年版これからのセキュリティ人財を考える(仮) 2015年版
これからのセキュリティ人財を考える(仮) 2015年版
 
TBD - To Block Connection from Suspicious IP addresses by using "DICE"
TBD - To Block Connection from Suspicious IP addresses by using "DICE"TBD - To Block Connection from Suspicious IP addresses by using "DICE"
TBD - To Block Connection from Suspicious IP addresses by using "DICE"
 
Reject con 20180620
Reject con 20180620Reject con 20180620
Reject con 20180620
 
Play_using_Proxy
Play_using_ProxyPlay_using_Proxy
Play_using_Proxy
 
Play_using_Proxy
Play_using_ProxyPlay_using_Proxy
Play_using_Proxy
 
Daimachi
DaimachiDaimachi
Daimachi
 
講義資料(公開用)
講義資料(公開用)講義資料(公開用)
講義資料(公開用)
 
Ssmjp201410 wakatono
Ssmjp201410 wakatonoSsmjp201410 wakatono
Ssmjp201410 wakatono
 
Joyful assembly language - Assembly Language Tanka
Joyful assembly language - Assembly Language TankaJoyful assembly language - Assembly Language Tanka
Joyful assembly language - Assembly Language Tanka
 
LC2005 LT
LC2005 LTLC2005 LT
LC2005 LT
 

KĂźrzlich hochgeladen

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

KĂźrzlich hochgeladen (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 

Dqb@first ac 2013_lt

  • 1. DQB – DNS Query Blocker Kunio Miyamoto Twitter: @wakatono Facebook: www.facebook.com/wakatono 1Copyright by Kunio Miyamoto
  • 2. DQB – DNS Query Blocker (in fact, fakes DNS response rather than blocking DNS query) Kunio Miyamoto Twitter: @wakatono Facebook: www.facebook.com/wakatono 2Copyright by Kunio Miyamoto
  • 3. Introduce myself☺ It’s a Joke ☺ Copyright by Kunio Miyamoto 3 A member and session chair of Kyoto 2012 FIRST TC Committee
  • 4. Phishing makes malicious sites like a real service sites. Copyright by Kunio Miyamoto 4 Reference: http://www.atmarkit.co.jp/fsecurity/special/65phishing/phishing01.html
  • 5. MITB viruses inject malicious forms to real contents Copyright by Kunio Miyamoto 5 Reference: http://www.smbc.co.jp/security/popup.html
  • 6. Common Spec:malicious hosts exist • Attacker prepares the host to receive data of victims’ like banking information. • Most of malicious host has own FQDN • IP addresses is changed due to their lifecycle – Stopping access to malicious hosts that have fixed IP addresses is easy due to many technology to take down. Copyright by Kunio Miyamoto 6
  • 7. Modern Attacks triggered by Web Access Copyright by Kunio Miyamoto 7 Which is better, left “Google” or right “Google” ? Both sites are better(correct) web site ☺
  • 8. How to avoid accessing to malicious host? • HTTP/HTTPS Proxy Server access block by using Blacklist – Load of Proxy Rises Up! • Takedown by ISP and Various Service Provider – Sometimes Long Term discussion is needed • Temporarily: – Stop by using DNS fake response • I assume this to use edge network(fake response from nearest DNS Cache Server) Copyright by Kunio Miyamoto 8
  • 9. How to make DNS fake response? Copyright by Kunio Miyamoto 9 1. Capture DNS request 2. Decide whether the response of captured request must be faked or not. 3. Get Request ID, Source IP/PORT, Destination IP/PORT, and request content. 4. Make Fake Response Packet from information of 2 5. Send fake response to clinet as soon as possible!
  • 10. Concept Diagram Copyright by Kunio Miyamoto 10
  • 11. Proof of Concept: Copyright by Kunio Miyamoto 11 About 1ms 1ms from request packet is captured to response packet (faked) is captured
  • 12. Normal Request/Response Copyright by Kunio Miyamoto 12 about 10ms from request packet is captured to response packet (faked) is captured I defeated the real DNS response speed ☺ DNS Response Chicken Race!
  • 13. Name Resolution Step interfared by DQB: • 1. DNS Request is sent by client • 2. Fake DNS Response is sent by DQB • 3. Real DNS Response is sent by DNS Cache Copyright by Kunio Miyamoto 13 One Request for Two Response!
  • 14. Now in progress of this research • I’m developing and evaluating the concept of DNS Query Blocker – To use linear search for finding DNS query to fake response spends 1ms for searching 10000 hosts to be blocked • Ideas for more(for example): Counter to fake response related to the request of domain name generated by DGA(Domain Generation Algorithm) Copyright by Kunio Miyamoto 14 What we call “Future Work” ☺
  • 15. LIMITATION! • Of course, this mechanism is not suitable for faking DNS response signed by DNSSEC mechanism. Copyright by Kunio Miyamoto 15
  • 16. Copyright by Kunio Miyamoto Thank you! @wakatono If possible, any questions are welcome via email or Twitter. Of course, in banquet or any networking time ☺ Special thanks to: My friends (they are illustrator in Japan) 16