Question
Draw a diagram with all the steps of the DNS rebinding attack. Label each step, and annotate each step with a short sentence explaining it.
Draw a diagram with all the steps of the DNS rebinding attack. Label each step, and annotate each step with a short sentence explaining it. (10 pts)
In the DNS rebinding attack, what is the purpose of malicious JavaScript that the attacker serves to visiting clients? (1 pt)
In one of the initial steps, the attacker binds attacker.org to his server with a short TTL. Why does the malicious script wait for the TTL to expire before connecting back to attacker.org? (1 pt)
Give ONE example of damage the attacker can do with successful DNS rebinding (note connecting to Alices internal server is not a valid answer, I am looking for something more specific). (1 pt)
What is pinning? (1 pt)
Why is the TTL of a DNS query response set by an authoritative name server in the zone? (1 pt)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started