Domain Names and DNS Concepts
37 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of a WHOIS record?

  • To provide a mapping of domain names to IP addresses
  • To store the legal owner's information of a domain (correct)
  • To check the availability of a domain name
  • To protect against phishing attacks
  • Which part of a domain name is the Top-Level Domain (TLD)?

  • The central portion of the domain name
  • The leftmost segment of the domain name
  • The prefix of the domain name
  • The rightmost segment of the domain name (correct)
  • What role do name servers play in DNS?

  • They maintain the WHOIS record of a domain
  • They secure the domain from attacks
  • They provide the IP address for a domain to a browser (correct)
  • They define the TLD of a domain name
  • What does DNSSEC help prevent?

    <p>Cache poisoning and man-in-the-middle (MITM) attacks</p> Signup and view all the answers

    Which of the following statements is incorrect about domain names?

    <p>SLD is the rightmost portion of the domain name</p> Signup and view all the answers

    What is the primary function of the Domain Name System (DNS)?

    <p>To translate domain names into IP addresses</p> Signup and view all the answers

    Which of these is an example of a Second-Level Domain (SLD)?

    <p>singaporetech</p> Signup and view all the answers

    What information is primarily contained in TLD Zone Files?

    <p>IP address mappings for domain names</p> Signup and view all the answers

    Which of the following records provides the list of mail exchange servers?

    <p>MX record</p> Signup and view all the answers

    Which statement best describes a registrant in terms of domain names?

    <p>The legal owner of the domain name</p> Signup and view all the answers

    What does the SOA record represent in DNS?

    <p>Zone administration information</p> Signup and view all the answers

    What tool can be used interactively to query internet name servers?

    <p>nslookup</p> Signup and view all the answers

    Which of the following is NOT a function of DNS Data View?

    <p>Decrypt user passwords</p> Signup and view all the answers

    Which service provides information about domain name ownership and contact details?

    <p>Netcraft</p> Signup and view all the answers

    What type of DNS record gives the alias for a domain name?

    <p>CNAME record</p> Signup and view all the answers

    What kind of information was believed to be leaked during the ICANN hack?

    <p>Harmless user preferences</p> Signup and view all the answers

    What is the primary purpose of using Google hacking techniques according to best practices?

    <p>To identify your own security problems</p> Signup and view all the answers

    Which of the following is NOT a recommended defense against Google hacking?

    <p>Ensuring sensitive information is removed completely</p> Signup and view all the answers

    What does the term 'doxing' refer to?

    <p>Gathering or deducing information about a person online</p> Signup and view all the answers

    What function does the robots.txt file serve?

    <p>It instructs well-behaved crawlers not to index certain pages</p> Signup and view all the answers

    Which of the following is a common misconception about removing sensitive information from the web?

    <p>The removal ensures complete privacy</p> Signup and view all the answers

    What is the primary tactic used in pretexting attacks?

    <p>Building a false sense of trust</p> Signup and view all the answers

    What distinguishes baiting from phishing attacks?

    <p>The use of physical media to distribute malware</p> Signup and view all the answers

    In what scenario does tailgating occur?

    <p>An unauthorized user follows an employee into a restricted area</p> Signup and view all the answers

    What is a key characteristic of the quid pro quo technique?

    <p>Offering a service in exchange for information</p> Signup and view all the answers

    What makes a hacker skilled at social engineering effective?

    <p>Ability to manipulate human weaknesses</p> Signup and view all the answers

    How do proficient attackers often gather information for a hack?

    <p>Spending time developing connections with insiders</p> Signup and view all the answers

    What is the primary purpose of a Google dork?

    <p>To find information not readily available on websites</p> Signup and view all the answers

    Which method is noted as most successful for social engineering attacks?

    <p>Phone calls to employees posing as legitimate requests</p> Signup and view all the answers

    Which situation is NOT likely to influence a social engineer's success?

    <p>Working in isolation without any prior relationship</p> Signup and view all the answers

    Which of the following is an example of using a Google hacking technique?

    <p>Using ext:txt inurl:passwd</p> Signup and view all the answers

    What does the Google Hacking Database (GHDB) provide?

    <p>A repository of advanced search queries and results</p> Signup and view all the answers

    Which advanced search string might find text files containing passwords?

    <p>ext:txt inurl:password</p> Signup and view all the answers

    What does the term 'bypass' in the context of logins refer to?

    <p>Accessing protected accounts without valid credentials</p> Signup and view all the answers

    What could 'intitle:index.of.accounts' be used to search for?

    <p>Directories that list account information</p> Signup and view all the answers

    Why is Google cache utilized?

    <p>To retrieve older versions of web pages</p> Signup and view all the answers

    What file type can be targeted while searching for potentially sensitive account records?

    <p>CSV files</p> Signup and view all the answers

    Study Notes

    Whois

    • Provides info about domain name registrant
    • The registrant is the legal owner of the domain

    Domain Names

    • A domain is a logical region of the Internet.
    • Domain names consist of one or more parts separated by periods, eg. “singaporetech.edu.sg”.
    • Top-Level Domain (TLD) name – rightmost portion of the domain name, eg. “.sg”
    • A Second-Level Domain (SLD) – next portion of a domain name (right to left), eg. “.org”.

    Domain Name System (DNS)

    • Each computer is assigned a unique IP address.
    • A hostname is an alias for the IP address, e.g. “SIT-NB-X220-456”.
    • When entering a domain name into a browser, name servers provide the IP address of the domain web server to the browser.

    DNSSEC

    • Domain Name System Security Extensions
    • Prevents cache poisoning and man-in-the-middle (MITM) attacks

    ICANN

    • Internet Corporation for Assigned Names and Numbers
    • In 2011, unauthorized persons gained access to usernames, email addresses, and encrypted passwords for profile accounts on ICANN.org website.
    • Leaked info included harmless information such as user preferences, public biographies, interests, newsletters, and subscriptions.

    Reconnaissance Techniques and Tools

    • DNS Data View: Extracts DNS records (MX, NS, A, SOA)
    • nslookup (also try dig): Queries internet name servers interactively. Translates domain name to IP address or vice versa.

    Netcraft

    - Provides internet security and data mining services.
    - Can be used to footprint a website.
    - Provides: Domain name owner, E-mail addresses, Name servers, Names and contact info of admin, technical staff.
    

    BuiltWith

    • Provides information about the technology used to build a website, such as programming languages, frameworks, and libraries.

    Social Engineering Attacks

    • Attacks that exploit human psychology to manipulate and trick victims into divulging sensitive information or granting unauthorized access.
    • Types of attacks:
      • Pretexting: attacker creates a false sense of trust e.g., sympathy, appeal to empathy.
      • Baiting: Enticement used to obtain login credentials e.g., free game download.
      • Quid Pro Quo: Promise of a benefit in exchange for a service.
      • Tailgating (Piggybacking): Attackers follow authorized individuals into restricted areas without proper authentication.

    Social Engineering Skills

    • Hackers must be able to use charm and influence to manipulate.
    • They must be able to build up insider knowledge and trust relationships.
    • Attackers may spend days to complete a hack:
      • Learning internal company lingo and culture.
      • Developing connections with key people - security personnel and IT system support staff.

    Techniques and Tools for Social Engineering Attacks

    • Calls to employees:
      • Call help desk as a new employee for help with a particular task.
      • Angry manager calls lower-level system admin because password has suddenly stopped working.
      • System admin calls employee to fix her account...passwd filetype:txt (no space after :).

    Google Hacking

    • Uses advanced Google search operators to find sensitive or hidden information that is not readily available on a website.
    • Google Dorking:
      • Info retrieved not for public.
      • Info available because not adequately secured.
    • Google Hacking Database (GHDB):
      • https://www.exploit-db.com/
      • https://www.exploit-db.com/google-hacking-database/

    Google Hacking Examples

    Google Cache

    • Why use it:
      • Signatures (forgery)
      • Financial information

    Shodan

    • Search engine for Internet-connected devices.
    • https://www.shodan.io/

    Defences Against Google Hacking

    • Use Google hacking techniques to uncover your own security problems.
    • Proper configuration for web-based devices:
      • Use strong authentication not defaults.
    • Have a good corporate security policy: e.g., policy for asset protection.
    • Educate users about best practices.
    • Use robots.txt so Web pages not indexed, but this can also signal sensitive data to attackers.

    Spam

    • Unsolicited bulk emails (e.g., phishing, malware)

    Doxing

    • Gathering or deducing information about someone using internet sources.
    • “Document Tracing”
    • Info could include name, age, email, address, telephone number, photographs etc.
    • Used for different reasons e.g., who hacked my camera?, is person X masquerading as person Y?

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on domain names, their components, and the Domain Name System (DNS). This quiz covers topics such as Whois information, top-level domains, and DNS security measures like DNSSEC. Dive into the fundamentals of how domains work in the internet ecosystem.

    More Like This

    Use Quizgecko on...
    Browser
    Browser