Implementation of DNS Rebinding
Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 92-95
Voir la notice de l'article provenant de la source Math-Net.Ru
The possibility of DNS Rebindng attack realization in modern browsers is researched. This attack is directed at bypassing Same Origin Policy. The conditions for successful attack realization when the target host is located in a local network are studied. A list of the most vulnerable browsers is produced. The attack is implemented in the BeEF (Browser Exploitation Framework) being a tool for penetration testing. Some advices for protection against this attack are given.
Keywords:
HTTP, pentesting, Web application security.
@article{PDMA_2015_8_a33,
author = {T. I. Milovanov},
title = {Implementation of {DNS} {Rebinding}},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {92--95},
publisher = {mathdoc},
number = {8},
year = {2015},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a33/}
}
T. I. Milovanov. Implementation of DNS Rebinding. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 92-95. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a33/