WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us

What you need to known about Domain Shadowing

You are most welcome to this post.
Domain Shadowing
Really thanks to you for your interest in this topics. :)

Domain shadowing involves the assailant yielding a parent arena and creating sixfold subdomains to be victimised during the attacks. Orbit following is the outgrowth of using hijacked users’ land enrollment logins to create galore subdomains to be misused by the cybercriminals.

The Cisco section explore aggroup, Talos Info Meet, initiate inform of orbit pursuit conduct in Sept 2011 when they observed a set of incidental domains creating galore subdomains. In the motion of 45 days, approximately 15% of the unit identified subdomains were created. Most of the subdomains were acrobatic for less than a day and saw less than ten hits. The subdomains were constructed using haphazardly generated section.
This is an increasingly competent knock transmitter since most individuals do not varan their land registrant accounts regularly. These accounts are typically compromised through phishing. Cybercriminals then log in with their credentials and make largest amounts of subdomains. Galore users have sextuple domains, which can give a nearly endless distribute of domains, providing the cybercriminals a large wares of URLs that they can rhythm through and abandonment after use.

The Talos Word Gather has saved individual 100 accounts that get been compromised that bed command of thousands of unique domains. The meet identified enveloping to 10,000 unequaled subdomains beingness utilized. This action has proven to be an effectual way to desist veritable perception techniques, such as blacklisting of web sites or IP addresses.

HTTP 302 cushioning and region chase are oftentimes victimized together by danger actors. For representation, an tap round oscillation typically follows this ordering:

  1. Compromised websites
  2. HTTP 302 cushioning
  3. Domain shadowing
  4. Exploit kit landing page
  5. Malware payload

Countermeasures to domain shadowing attacks include the following:

  • Ensure that all the domain registrants’ accounts are secured. Strong authentication, preferably two-factor authentication, must be required in order to access these accounts to prevent them from being compromised.
  • Require domain owners to periodically verify their domain registrant accounts, and check for any fraudulent subdomains created.
  • Use a service such as Cisco OpenDNS to block the users from accessing malicious web sites.
  • Deploy a web proxy security solution, such as the Cisco Web Security Appliance or the Cisco Cloud Web Security, to block users from accessing malicious web sites.

In the figure below, the hijacked domain registrant account is example.com with a list of subdomains that have been created by the cyber-criminals.

Domain Shadowing

Domain Shadowing

Jul 21, 2018Himadri
 

Share with friends :

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to print (Opens in new window)

Related

Know about HTTP 302 CushioningKnow about Command Injections

Leave a Reply Cancel reply

nine − four =

Himadri

Hi, I'm Himadri. I love blogging with tech topics, specially computer networking. We'll have more fun in the upcoming day. Stay with me. :)

July 21, 2018 Cyber Security370
Feel Free to Share :)
0
GooglePlus
0
Facebook
0
Twitter
0
Digg
0
Delicious
0
Stumbleupon
0
Linkedin
0
Pinterest
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • Free download Principles of Electronics by VK Mehta
  • Free download Cisco Packet Tracer 7.3 for Windows 64 bit
  • Autonomous and light weight access point
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 19 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking
     

    Loading Comments...