In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but the record itself has not yet been purged from DNS. In this paper, we shed light on a largely overlooked threat in DNS posed by dangling DNS records. Our work reveals that Dare can be easily manipulated by adversaries for domain hijacking. In particular, we identify three attack vectors that an adversary can harness to exploit Dares. In a large-scale measurement study, we uncover 467 exploitable Dares in 277 Alexa top 10,000 domains and 52 edu zones, showing that Dare is a real, prevalent threat. By exploiting these Dares, an adversary can take full control of the (sub) domains and can even have them signed with a Certificate Authority (CA). It is e...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
The DNS is a fundamental service that has been repeatedly attacked and abused. DNS manipulation is a...
Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS c...
In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but the rec...
We investigate how the widespread absence of signatures in DNS (Domain Name System) delegations, in ...
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle...
DNS infrastructure hijacks are a class of attacks wherein the attack is theresult of an attacker con...
The Domain Name System protocol is often abused to perform denial-of-service attacks. These attacks,...
Abstract—DNS cache poisoning is a stepping stone towards advanced (cyber) attacks, and can be used t...
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle ...
The Domain Name System (DNS) provides domain-to-address lookup-services used by almost all internet ...
DNS cache poisoning is a stepping stone towards advanced (cyber) attacks, and can be used to monitor...
The Domain Name System (DNS) is a fundamental element of today's Internet. Virtually all online conn...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
The traditional design principle for Internet protocols indicates: "Be strict when sending and toler...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
The DNS is a fundamental service that has been repeatedly attacked and abused. DNS manipulation is a...
Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS c...
In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but the rec...
We investigate how the widespread absence of signatures in DNS (Domain Name System) delegations, in ...
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle...
DNS infrastructure hijacks are a class of attacks wherein the attack is theresult of an attacker con...
The Domain Name System protocol is often abused to perform denial-of-service attacks. These attacks,...
Abstract—DNS cache poisoning is a stepping stone towards advanced (cyber) attacks, and can be used t...
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle ...
The Domain Name System (DNS) provides domain-to-address lookup-services used by almost all internet ...
DNS cache poisoning is a stepping stone towards advanced (cyber) attacks, and can be used to monitor...
The Domain Name System (DNS) is a fundamental element of today's Internet. Virtually all online conn...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
The traditional design principle for Internet protocols indicates: "Be strict when sending and toler...
Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the D...
The DNS is a fundamental service that has been repeatedly attacked and abused. DNS manipulation is a...
Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS c...