Exploitnig DNS Server Vulnerabilites Using Linux Operating System
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 9
Abstract
Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer. Exploiting domain name system (DNS) vulnerabilities have resulted in a range of high profile disruptions and outages for major internet sites around the world. DNS attack is an exploit in which an attacker takes advantage of vulnerabilities is the (DNS). This paper will present the vulnerabilities and the weak points of the DNS server and how attackers (black hat hakcer) can exploit those vulnerabilities to attack and gain access to the server machine. In conclusion, presenting and implementing this project make users understand the hazard of hackers. Then, will lead to build secure and protected systems and applications.
Authors and Affiliations
Aysar A. Abdulrahman, Alaa K. Jumaa
Genetic Algorithm for solving flow problems in a Stochastic-flow Network under Budget Constraints
The system reliability (Rd,c) calculation is based on the generation of all the lower boundary points for the given demand, d, such that the total transmission cost is less than or equal to c (budget). This generation of...
Rejuvenating Public-Private Partnerships (PPPs) in Asia
Infrastructure-building has become a focus area in Asia as targeted GDP growth rates climb higher. Selection of projects as PPP projects or pure public sector projects has to be done carefully comparing costs and benef...
Content Based Image Retrieval using Texture, Color and Shape for Image Analysis
Content- Based Image Retrieval(CBIR) or QBIR is the important field of research..Content Based Image retrieval has gained much popularity in the past Content-based image retrieval (CBIR)[1] system has also helped...
CPW Fed Hexagonal Patch Shape with Hexagonal slot Ultra Wideband Antenna
In this paper hexagonal patch shape with hexagonal slot, ultra wideband antenna is proposed. The total dimensions of antenna are 55×43.5mm. Sides of hexagonal patch are taken 13mm each and hexagonal slot sides are taken...
COMPRO-MOTO: An efficient approach for identifying compromised nodes in wireless sensor networks.
Wireless sensor networks (WSNs) are exposed and being attacked by opponents as they are randomly deployed in open environments. Opponents can extract confidential information like secret keys by inserting their own nodes...