The presentation discusses DNS cache poisoning and IP fragmentation attacks as methods of injecting spoofed values into DNS resolvers and IP defragmentation caches, respectively. The speaker explains how these attacks can be used to intercept validation codes during the process of obtaining a certificate from a certificate authority. The presentation also touches on potential mitigation mechanisms for these attacks.
- DNS cache poisoning and IP fragmentation attacks can be used to inject spoofed values into DNS resolvers and IP defragmentation caches, respectively
- These attacks can be used to intercept validation codes during the process of obtaining a certificate from a certificate authority
- Mitigation mechanisms for these attacks include IP fragmentation attacks and the challenge response mechanism built into DNS
- Multiple vantage points for DNS queries may increase security
The speaker explains how DNS cache poisoning works by injecting spoofed values into the DNS resolver's cache, and how this can be prevented through the challenge response mechanism built into DNS. They then go on to describe IP fragmentation attacks, which involve injecting spoofed values into the IP defragmentation cache of the target receiver. The speaker illustrates this point by describing how a malicious actor could use this attack to intercept validation codes during the process of obtaining a certificate from a certificate authority.