Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Remote dns attack

09/01/2021 Client: saad24vbs Deadline: 10 Days

Remote DNS Cache Poisoning Attack Lab


Due by midnight November 4, 2020


DNS (Domain Name System) is the Internet’s phone book; it translates hostnames to IP addresses (and vice versa). This translation is through DNS resolution, which happens behind the scene. DNS attacks manipulate this resolution process in various ways, with an intent to misdirect users to alternative destinations, which are often malicious. The objective of this lab is to understand how such attacks work. You will first set up and configure a DNS server, and then you will try various DNS attacks on the target that is also within the lab environment.


The difficulties of attacking local victims versus remote DNS servers are quite different. Therefore, we have developed two labs, one focusing on local DNS attacks, and the other on remote DNS attack. This lab focuses on remote attacks.


Lab Learning Objectives


• Understand DNS and how it works • Conduct remote DNS cache poisoning attack • Be familiar with Scapy DNS class


Lab Setup


The main purpose of this lab is on remote DNS attacks, and our attacking target is a local DNS server. Obviously, it is illegal to attack a real machine, so we need to set up our own DNS server to conduct the attack experiments. The lab environment needs three separate machines: one for the victim, one for the DNS server, and the other for the attacker. We will run these three virtual machines on one physical machine. All these VMs will run the pre-built Ubuntu 16.04 VM image. Figure below illustrates the setup of the experiment environment.


For the sake of simplicity, we put all these VMs on the same network. In the following sections, we assume that the user machine’s IP address is 10.0.2.18, the DNS Server’s IP is 10.0.2.16 and the attacker machine’s IP is 10.0.2.17. Please be noted that your VMs’ IP addresses may be different from those


shown in the figure. We need to configure the user machine and the local DNS server; for the attacker machine, the default setup in the VM should be sufficient.


Lab Instructions


1. First, in order to have three VMs, we will clone the Ubuntu 16.04 VM. In this lab, the original Ubuntu 16.04 VM will serve as attacker. We will clone the VM for the Victim. Make sure that Ubuntu 16.04 VM is powered off. Right click Ubuntu 16.04 in VMWare Workstation, select Manage then select Clone….


Click Next> on the next screen. Select The current state in the virtual machine radio button, then click the Next button.


In the next window, select Create a full clone radio button, then click the Next button.


In the next Window, enter Victim as the virtual machine name, then click the Finish button.


Repeat the same process to clone a VM for the DNS Server. To differentiate three different VMs, let change the background from the default blue color to a different one. Right click the desktop and select Change Desktop Background. In the next screen, choose the wallpapers you like.


2. In this step, we will configure the Victim VM. On the Victim VM, we need to use 10.0.2.16 as the local DNS server (by default, the DNS server program is already running in the SEED VM). This is achieved by changing the resolver configuration file (/etc/resolv.conf) of the Victim machine, so the server 10.0.2.16 is added as the first nameserver entry in the file, i.e., this server will be used as the primary DNS server. Unfortunately, our provided VM uses the Dynamic Host Configuration Protocol (DHCP) to obtain network configuration parameters, such as IP address, local DNS server, etc. DHCP clients will overwrite the /etc/resolv.conf file with the information provided by the DHCP server.


One way to get our information into /etc/resolv.conf without worrying about the DHCP is to add the following entry to the /etc/resolvconf/resolv.conf.d/head file. Open the file by


$ sudo gedit /etc/resolvconf/resolv.conf.d/head


Add the following entry to /etc/resolvconf/resolv.conf.d/head


nameserver your_ DNS_Server_VM’s_IP_Address


Run the following command for the change to take effect


$ sudo resolvconf -u


If the resolvconf is not installed on the current VM, run the following command to install it.


$ sudo apt-get install resolvconf


The content of the head file will be prepended to the dynamically generated resolver configuration file. Normally, this is just a comment line (the comment in /etc/resolv.conf comes from this head file).


After you finish configuring the user machine, use the dig command to get an IP address from a hostname of your choice. From the response, please provide evidences to show that the response is indeed from your local DNS server. If you cannot find the evidence, your setup is not successful.


3. In this step, we will configure the local DNS server. For the local DNS server, we need to run a DNS server program. The most widely used DNS server software is called BIND (Berkeley Internet Name Domain), which, as the name suggests, was originally designed at the University of California Berkeley in


the early 1980s. The latest version of BIND is BIND 9, which was first released in 2000. We will show how to configure BIND 9 for our lab environment. The BIND 9 server program is already installed in our pre-built Ubuntu VM image. The configurations listed in the following Tasks 1, 2 and 3 haven been already implemented in the current Ubuntu 16.04 VM. They are listed just for information purpose.


Task 1: Configure the BIND 9 server. BIND 9 gets its configuration from a file called /etc/bind/named.conf. This file is the primary configuration file, and it usually contains several "include" entries, i.e., the actual configurations are stored in those included files. One of the included files is called /etc/bind/named.conf.options. This is where we typically set up the configuration options. Let us first set up an option related to DNS cache by adding a dump-file entry to the options block.


options {


dump-file "/var/cache/bind/dump.db";


};


The above option specifies where the cache content should be dumped to if BIND is asked to dump its cache. If this option is not specified, BIND dumps the cache to a default file called /var/cache/bind/named_dump.db. The two commands shown below are related to DNS cache. The first command dumps the content of the cache to the file specified above, and the second command clears the cache.


$ sudo rndc dumpdb -cache // Dump the cache to the sepcified file


$ sudo rndc flush // Flush the DNS cache


Task 2: Turn off DNSSEC. DNSSEC is introduced to protect against spoofing attacks on DNS servers. To show how attacks work without this protection mechanism, we need to turn the protection off. This is done by modifying the named.conf.options file: comment out the dnssec-validation entry, and add a dnssec-enable entry.


options {


# dnssec-validation auto;


dnssec-enable no;


};


Task 3: Fix the Source Ports. DNS servers now randomize the source port number in their DNS queries. This s makes the attacks much more difficult. Unfortunately, many DNS servers still use predictable source port number. For the sake of simplicity in this lab, we assume that the source port number is a fixed number. We can set the source port for all DNS queries to 33333. This can be done by adding the following option to the file /etc/bind/named.conf.options.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Best Coursework Help
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$112 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$115 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$110 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$110 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

NTC/302: Network Web Services - Discussion W2 - Walker everyday use analysis - Apply: Security Analysis - A statement of stockholders' equity is normally prepared when - Wa su zo tean o meaning - Week9 - Walgreens extreme whitening wraps review - 520 rush - How is gladwell's blog post organized - Case study on yahoo - Segmentation scheme - Which of the following are requirements of a relational database - Stuart hall the west and the rest - Pros and cons of gainsharing - P6#1 - 5.1 4 gram staining conclusion questions quizlet - Nationalism - Discussions(SPORT AND SOCIETY) - Hyson green community centre - Target - Who played ferrari in casablanca - Raymor amethyst counter top basin - Singleton hospital phone number - Macbeth and lady macbeth relationship act 3 - What are the four strategic alternatives - Interstate bakeries case study - Data structures and Algorithm Analysis - Erm adoption and implementation in the higher education environment - I need 550 words to answers my questions in global companies and staff policies - Ethane reacts with bromine in the presence of ultraviolet light - Gulf electroquip houston tx - POL 101 need 3 pages - Assignment 6 - Corning gorilla glass 3 - Mr gustave j lesueur titanic - How to assess abdomen nursing - Stag's leap sharon olds pdf - Separation of benzoic acid and naphthalene lab report - Vodka cruiser vanilla pine lime - Heineken strategy analysis - International Accounting 2 Page Essay - Assignment 10/9 - Yeast experiments for middle school - Jake Garnder and James Surlock 300 words - Yo quiero taco bell translation - New skool grooves case study - Unimail hud ac uk - Physics 12 circular motion worksheet 2 answers - Games Games Games Games - Chemistry in context answers aquatherm pipe and fittings - How to cite fasb codification in apa - Lab 7: ecological interactions - Frogs the thin green line video answers - Capital budgeting analysis excel template - Straw bridge challenge instructions - 5 paragraph opord template - Specializes in making a physics lab - Object oriented integration and system testing - Carlill v carbolic smoke ball co [1893] 1 qb 256. - The right thing to do rachels ebook - Wall street journal ipad app problems - Absolute lovers sj hooks epub - Week6 - PSY 5-2 - Suppose a bakery reports this information - Pre lab questions answers biology - What is a characteristic of spanning tree - What you pawn i will redeem annotated bibliography - ENG 1252 MOD 3 Annonated - Three levels of analysis in organizational behavior - Asset maintenance engineer job description - LDR/711A: Leadership Theory And Practice Wk 4 - Case Study Analysis - Words with prefix tri - Mba academic and professional document guidelines - 521 Week 5 Field Activity Paper - 2012 sor hsc paper - English - Project Human Resources and Communications Management - Tom buckley lancaster university - Valley pool table disassembly - Characteristics of hard disk - Define formed elements and list the major categories - Houses to rent in melton mowbray that accept housing benefit - Bransford and johnson 1972 summary - Musyokiones - Martin luther king and malcolm x worksheet - Sunbeam corporation stock price - Salem witch trails - Csi wildlife analyzing genetic evidence - Adding ed and ing worksheets pdf - List the steps to making ethical decisions - Research Paper - Due 10/26 - Intro to Intelligence - Hold spellbound crossword clue - Red rag to a bull mythbusters - Palo alto 5250 throughput - Racial Disparities of COVID-19 Reflection Questions - Panania uniforms & embroidery - Organizational culture select all that apply - Stock date codes and rotation labels - Reflection on learning