Home
 Break PWD
 Security Advisory
 IT Security Questions
 SIEM
 Booting Slow
 The Registry
 Interview Questions
 Malware
 Q-radar SIEM
 DNS
 Imp-Link
 Download


login

    

OMWINDOWS

OMPRAKASH SINGH PRASTE  



Domain generation algorithm (DGA)

are algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers

 

For example, an infected computer could create thousands of domain names such as: www.<gibberish>.com and would attempt to contact a portion of these with the purpose of receiving an update or commands.

 

What is fast flux DNS?

 

Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies. It can also refer to the combination of peer-to-peer networking, distributed command and control, web-based load balancing and proxy redirection used to make malware networks more resistant to discovery and counter-measures.

 

Fast flux DNS is a technique that a cybercriminal can use to prevent identification of his key host server's IP address. By abusing the way the domain name system works, the criminal can create a botnet with nodes that join and drop off the network faster than law enforcement officials can trace them.

 

What is DNS poisoning?

DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP addressdiverting traffic to the attacker's computer (or any other computer).

 

Your DNS cache stores the locations (IP addresses) of web servers that contain web pages which you have recently viewed. If the location of the web server changes before the entry in your DNS cache updates, you can no longer access the site.

 

 

What ARP Attacks

 

ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.

 

In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofedAddress Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.

 

What are your major achievements

where do you see yourself in next 3 years –  I don't know where I will be after five years, but I am sure that I will be learning something new and Will be giving my best to this company.

what do you want to do in our company - I want to work with your company because I want to put skills and talent.