all InfoSec news
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. (arXiv:2205.05439v1 [cs.CR])
May 12, 2022, 1:20 a.m. | Philipp Jeitner, Haya Shulman
cs.CR updates on arXiv.org arxiv.org
The traditional design principle for Internet protocols indicates: "Be strict
when sending and tolerant when receiving" [RFC1958], and DNS is no exception to
this. The transparency of DNS in handling the DNS records, also standardised
specifically for DNS [RFC3597], is one of the key features that made it such a
popular platform facilitating a constantly increasing number of new
applications. An application simply creates a new DNS record and can instantly
start distributing it over DNS without requiring any changes …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Network AWS Cloud &Firewall Engineer
@ Arthur Grand Technologies Inc | Plano, TX, United States
Lead Consultant, Data Centre & BCP
@ Singtel | Singapore, Singapore
Protocol Security Engineer
@ Osmosis Labs | Remote
Technical Engineer - Payments Security Specialist
@ H&M Group | Bengaluru, India
Intern, Security Architecture
@ Sony | Work from Home-CA