Domain Names and DNS Concepts
37 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of a WHOIS record?

  • To provide a mapping of domain names to IP addresses
  • To store the legal owner's information of a domain (correct)
  • To check the availability of a domain name
  • To protect against phishing attacks

Which part of a domain name is the Top-Level Domain (TLD)?

  • The central portion of the domain name
  • The leftmost segment of the domain name
  • The prefix of the domain name
  • The rightmost segment of the domain name (correct)

What role do name servers play in DNS?

  • They maintain the WHOIS record of a domain
  • They secure the domain from attacks
  • They provide the IP address for a domain to a browser (correct)
  • They define the TLD of a domain name

What does DNSSEC help prevent?

<p>Cache poisoning and man-in-the-middle (MITM) attacks (A)</p> Signup and view all the answers

Which of the following statements is incorrect about domain names?

<p>SLD is the rightmost portion of the domain name (A)</p> Signup and view all the answers

What is the primary function of the Domain Name System (DNS)?

<p>To translate domain names into IP addresses (D)</p> Signup and view all the answers

Which of these is an example of a Second-Level Domain (SLD)?

<p>singaporetech (B)</p> Signup and view all the answers

What information is primarily contained in TLD Zone Files?

<p>IP address mappings for domain names (C)</p> Signup and view all the answers

Which of the following records provides the list of mail exchange servers?

<p>MX record (D)</p> Signup and view all the answers

Which statement best describes a registrant in terms of domain names?

<p>The legal owner of the domain name (A)</p> Signup and view all the answers

What does the SOA record represent in DNS?

<p>Zone administration information (C)</p> Signup and view all the answers

What tool can be used interactively to query internet name servers?

<p>nslookup (D)</p> Signup and view all the answers

Which of the following is NOT a function of DNS Data View?

<p>Decrypt user passwords (D)</p> Signup and view all the answers

Which service provides information about domain name ownership and contact details?

<p>Netcraft (A)</p> Signup and view all the answers

What type of DNS record gives the alias for a domain name?

<p>CNAME record (D)</p> Signup and view all the answers

What kind of information was believed to be leaked during the ICANN hack?

<p>Harmless user preferences (B)</p> Signup and view all the answers

What is the primary purpose of using Google hacking techniques according to best practices?

<p>To identify your own security problems (A)</p> Signup and view all the answers

Which of the following is NOT a recommended defense against Google hacking?

<p>Ensuring sensitive information is removed completely (A)</p> Signup and view all the answers

What does the term 'doxing' refer to?

<p>Gathering or deducing information about a person online (A)</p> Signup and view all the answers

What function does the robots.txt file serve?

<p>It instructs well-behaved crawlers not to index certain pages (A)</p> Signup and view all the answers

Which of the following is a common misconception about removing sensitive information from the web?

<p>The removal ensures complete privacy (C)</p> Signup and view all the answers

What is the primary tactic used in pretexting attacks?

<p>Building a false sense of trust (D)</p> Signup and view all the answers

What distinguishes baiting from phishing attacks?

<p>The use of physical media to distribute malware (A)</p> Signup and view all the answers

In what scenario does tailgating occur?

<p>An unauthorized user follows an employee into a restricted area (D)</p> Signup and view all the answers

What is a key characteristic of the quid pro quo technique?

<p>Offering a service in exchange for information (A)</p> Signup and view all the answers

What makes a hacker skilled at social engineering effective?

<p>Ability to manipulate human weaknesses (C)</p> Signup and view all the answers

How do proficient attackers often gather information for a hack?

<p>Spending time developing connections with insiders (D)</p> Signup and view all the answers

What is the primary purpose of a Google dork?

<p>To find information not readily available on websites (B)</p> Signup and view all the answers

Which method is noted as most successful for social engineering attacks?

<p>Phone calls to employees posing as legitimate requests (D)</p> Signup and view all the answers

Which situation is NOT likely to influence a social engineer's success?

<p>Working in isolation without any prior relationship (B)</p> Signup and view all the answers

Which of the following is an example of using a Google hacking technique?

<p>Using ext:txt inurl:passwd (C)</p> Signup and view all the answers

What does the Google Hacking Database (GHDB) provide?

<p>A repository of advanced search queries and results (D)</p> Signup and view all the answers

Which advanced search string might find text files containing passwords?

<p>ext:txt inurl:password (C)</p> Signup and view all the answers

What does the term 'bypass' in the context of logins refer to?

<p>Accessing protected accounts without valid credentials (A)</p> Signup and view all the answers

What could 'intitle:index.of.accounts' be used to search for?

<p>Directories that list account information (B)</p> Signup and view all the answers

Why is Google cache utilized?

<p>To retrieve older versions of web pages (C)</p> Signup and view all the answers

What file type can be targeted while searching for potentially sensitive account records?

<p>CSV files (D)</p> Signup and view all the answers

Study Notes

Whois

  • Provides info about domain name registrant
  • The registrant is the legal owner of the domain

Domain Names

  • A domain is a logical region of the Internet.
  • Domain names consist of one or more parts separated by periods, eg. “singaporetech.edu.sg”.
  • Top-Level Domain (TLD) name – rightmost portion of the domain name, eg. “.sg”
  • A Second-Level Domain (SLD) – next portion of a domain name (right to left), eg. “.org”.

Domain Name System (DNS)

  • Each computer is assigned a unique IP address.
  • A hostname is an alias for the IP address, e.g. “SIT-NB-X220-456”.
  • When entering a domain name into a browser, name servers provide the IP address of the domain web server to the browser.

DNSSEC

  • Domain Name System Security Extensions
  • Prevents cache poisoning and man-in-the-middle (MITM) attacks

ICANN

  • Internet Corporation for Assigned Names and Numbers
  • In 2011, unauthorized persons gained access to usernames, email addresses, and encrypted passwords for profile accounts on ICANN.org website.
  • Leaked info included harmless information such as user preferences, public biographies, interests, newsletters, and subscriptions.

Reconnaissance Techniques and Tools

  • DNS Data View: Extracts DNS records (MX, NS, A, SOA)
  • nslookup (also try dig): Queries internet name servers interactively. Translates domain name to IP address or vice versa.

Netcraft

- Provides internet security and data mining services.
- Can be used to footprint a website.
- Provides: Domain name owner, E-mail addresses, Name servers, Names and contact info of admin, technical staff.

BuiltWith

  • Provides information about the technology used to build a website, such as programming languages, frameworks, and libraries.

Social Engineering Attacks

  • Attacks that exploit human psychology to manipulate and trick victims into divulging sensitive information or granting unauthorized access.
  • Types of attacks:
    • Pretexting: attacker creates a false sense of trust e.g., sympathy, appeal to empathy.
    • Baiting: Enticement used to obtain login credentials e.g., free game download.
    • Quid Pro Quo: Promise of a benefit in exchange for a service.
    • Tailgating (Piggybacking): Attackers follow authorized individuals into restricted areas without proper authentication.

Social Engineering Skills

  • Hackers must be able to use charm and influence to manipulate.
  • They must be able to build up insider knowledge and trust relationships.
  • Attackers may spend days to complete a hack:
    • Learning internal company lingo and culture.
    • Developing connections with key people - security personnel and IT system support staff.

Techniques and Tools for Social Engineering Attacks

  • Calls to employees:
    • Call help desk as a new employee for help with a particular task.
    • Angry manager calls lower-level system admin because password has suddenly stopped working.
    • System admin calls employee to fix her account...passwd filetype:txt (no space after :).

Google Hacking

  • Uses advanced Google search operators to find sensitive or hidden information that is not readily available on a website.
  • Google Dorking:
    • Info retrieved not for public.
    • Info available because not adequately secured.
  • Google Hacking Database (GHDB):
    • https://www.exploit-db.com/
    • https://www.exploit-db.com/google-hacking-database/

Google Hacking Examples

Google Cache

  • Why use it:
    • Signatures (forgery)
    • Financial information

Shodan

  • Search engine for Internet-connected devices.
  • https://www.shodan.io/

Defences Against Google Hacking

  • Use Google hacking techniques to uncover your own security problems.
  • Proper configuration for web-based devices:
    • Use strong authentication not defaults.
  • Have a good corporate security policy: e.g., policy for asset protection.
  • Educate users about best practices.
  • Use robots.txt so Web pages not indexed, but this can also signal sensitive data to attackers.

Spam

  • Unsolicited bulk emails (e.g., phishing, malware)

Doxing

  • Gathering or deducing information about someone using internet sources.
  • “Document Tracing”
  • Info could include name, age, email, address, telephone number, photographs etc.
  • Used for different reasons e.g., who hacked my camera?, is person X masquerading as person Y?

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on domain names, their components, and the Domain Name System (DNS). This quiz covers topics such as Whois information, top-level domains, and DNS security measures like DNSSEC. Dive into the fundamentals of how domains work in the internet ecosystem.

More Like This

DNS: Sistema de Nombres de Dominio
42 questions
DNS - Domain Name System Grundlagen
18 questions

DNS - Domain Name System Grundlagen

IrreplaceableEmerald6900 avatar
IrreplaceableEmerald6900
Use Quizgecko on...
Browser
Browser