Implementation of DNS Rebinding
Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 92-95.

Voir la notice de l'article provenant de la source Math-Net.Ru

The possibility of DNS Rebindng attack realization in modern browsers is researched. This attack is directed at bypassing Same Origin Policy. The conditions for successful attack realization when the target host is located in a local network are studied. A list of the most vulnerable browsers is produced. The attack is implemented in the BeEF (Browser Exploitation Framework) being a tool for penetration testing. Some advices for protection against this attack are given.
Keywords: HTTP, pentesting, Web application security.
@article{PDMA_2015_8_a33,
     author = {T. I. Milovanov},
     title = {Implementation of {DNS} {Rebinding}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {92--95},
     publisher = {mathdoc},
     number = {8},
     year = {2015},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a33/}
}
TY  - JOUR
AU  - T. I. Milovanov
TI  - Implementation of DNS Rebinding
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2015
SP  - 92
EP  - 95
IS  - 8
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2015_8_a33/
LA  - ru
ID  - PDMA_2015_8_a33
ER  - 
%0 Journal Article
%A T. I. Milovanov
%T Implementation of DNS Rebinding
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2015
%P 92-95
%N 8
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2015_8_a33/
%G ru
%F PDMA_2015_8_a33
T. I. Milovanov. Implementation of DNS Rebinding. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 92-95. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a33/