翻訳と辞書
Words near each other
・ DNQX
・ DNR
・ DNR (music)
・ DNS (disambiguation)
・ DNS Advantage
・ DNS analytics
・ Dns Bajaj
・ DNS Belgium
・ DNS blocking
・ DNS Certification Authority Authorization
・ DNS hijacking
・ DNS hosting service
・ DNS Long-Lived Queries
・ DNS management software
・ DNS NXD Advert Overriding
DNS rebinding
・ DNS root zone
・ DNS sinkhole
・ DNS spoofing
・ DNS zone
・ DNS zone transfer
・ DNS-based Authentication of Named Entities
・ DNS.com
・ DNSA
・ DNSAP
・ DNSBL
・ DNSC
・ DNSChanger
・ DNSCurve
・ DNSimple


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

DNS rebinding : ウィキペディア英語版
DNS rebinding

DNS rebinding is a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script that attacks machines elsewhere on the network. In theory, the same-origin policy prevents this from happening: client-side scripts are only allowed to access content on the same host that served the script. Comparing domain names is an essential part of enforcing this policy, so DNS rebinding circumvents this protection by abusing the Domain Name System (DNS).
This attack can be used to breach a private network by causing the victim's web browser to access machines at private IP addresses and returning the results to the attacker. It can also be used to use the victim machine for spamming, distributed denial-of-service attacks and other malicious activities.
==How DNS rebinding works==

The attacker registers a domain (such as attacker.com) and delegates it to a DNS server he controls. The server is configured to respond with a very short time to live (TTL) record, preventing the response from being cached. When the victim browses to the malicious domain, the attacker's DNS server first responds with the IP address of a server hosting the malicious client-side code. For instance, he could point the victim's browser to a website that contains malicious JavaScript or Flash.
The malicious client-side code makes additional accesses to the original domain name (such as attacker.com). These are permitted by the same-origin policy. However, when the victim's browser runs the script it makes a new DNS request for the domain, and the attacker replies with a new IP address. For instance, he could reply with an internal IP address or the IP address of a target somewhere else on the Internet.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「DNS rebinding」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.