Site icon TheCyberThrone

DNS Rebinding Attack

Advertisements

Cybercriminals can manage to compromise internal networks by abusing web-based consoles under a technique called DNS rebinding. It is a method that exposes the attack surface of internal web applications to malicious websites after being launched on victims’ browsers.

DNS rebinding workability

Popular browsers employ same-origin policy wherein various resources such as JavaScript, images, and CSS are loaded from the same server to run a web application.It has been found that attackers can use DNS rebinding to bypass this and allow cross-origin requests.

Internal penetration

Real attack

The DNS rebinding attack can use victims’ browsers as a proxy to expand the attack surface to private networks, as demonstrated by the researchers via a POC attack.

Countermeasures

There are several protective methods in practice today Browser-based DNS pinning method; DNS-based using DNS caching software; Server-based mitigation implementing HTTPS communication on private services and; real-time DNS rebinding detection.

Final Thoughts

DNS rebinding technique is a serious threat. Web browser vendors, web application owners, and DNS resolvers need to apply appropriate protection strategies to ensure security against such threats.

Exit mobile version