Sunday, November 27, 2016

Flash Talk:Protocol Vulnerabilities

                      Flash Talk
                                           Protocol Vulnerabilities

The Internet is expanding and becoming bigger everyday and Vulnerabilities/hacking are increasing. The Internet or the “Net” is a global system that interconnects with many computer networks. In other words the internet is a system that connects the networks which could send and receive information to users. Internet Vulnerabilities could be very common at times and could increase the risk to be hacked. This is called Internet spoofing, but there is more to it. For example, Internet spoofing is a created internet protocol packets that have a false Ip address. An Ip address is a bunch of numbers that is separated by periods that identifies each computer in the internet. Once that Ip address is false you could be lead to a fake website which is vulnerable. For hackers it could be easy to intercept or encrypt the data. This could be dangerous and cause the hacker to steal the information. There are many Protocol Vulnerabilities in the Internet protocols. For example some of them are HTTP, DNS,TCP, IP,etc. These are protocols that guide or instruct the computer on what to do.


There are many protocol vulnerabilities that affect the computer and may cause a threat to users. A malicious hacker could intercept data and use it for his/her advantage. An example of this could be a command protocol, DNS. The Domain Name Server (DNS) is the main directory and looks up the Ip address. In other words it's like the phone book of the internet. It could be a worldwide collection of the DNS servers that are available. They communicate using network protocols. It's a database system that send and retrieves data to the servers and computers. But there are vulnerabilities to DNS, and could exploit your information to the hackers. There are many security issues with the DNS and is a nice target for many of the hackers out there. Traffic could also be a issue to this and cause delays with the server. But since these are hackers hacking into the DNS we call it DNS spoofing or DNS cache poisoning.These attacks send out false information to a user it could be a server exchange. An example of this could be an unrelated attack. The hacker uses a recursive query so get into the DNS server by requiring a domain. He will then add answers to the cache this way to emote this DNS server. Another is related data attack and it is just like the unrelated attack but the hacker adds extra information to the original query. To sum up there are many attacks that may intercept/add the information from the DNS servers. Finally, the internet is expanding and getting better, so does the DNS but it can't keep up with its vulnerabilities to its server.


                 https://en.wikipedia.org/wiki/IP_address
                 https://en.wikipedia.org/wiki/IP_address_spoofing
                             https://www.sans.org/reading-room/whitepapers/dns/security-issues-dns-1069
                              https://www.lifewire.com/what-is-a-dns-server-817513

 

No comments:

Post a Comment