<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS NXNAattack bug in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/DNS-NXNAattack-bug/m-p/35858#M4526</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another attack on poor old DNS:&amp;nbsp; It is hard to believe in this technological world, we remain reliant on this insecure service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Dubbed NXNSAttack, &lt;A href="http://www.nxnsattack.com/shafir2020-nxnsattack-paper.pdf" target="_blank" rel="nofollow noopener"&gt;the flaw&lt;/A&gt; [PDF] can be abused to pull off a classic amplification attack: you send a small amount of specially crafted data to a DNS server, which responds by sending a lot of data to a victim's server. If you have an army of hacked PCs or devices – a botnet – at your command, and can find a DNS service that's vulnerable, you can theoretically generate enough network traffic to overwhelm a victim's system and knock it offline for all users."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.theregister.co.uk/2020/05/21/nxnaattack_bug_disclosed/" target="_blank"&gt;https://www.theregister.co.uk/2020/05/21/nxnaattack_bug_disclosed/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Thu, 21 May 2020 22:08:14 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2020-05-21T22:08:14Z</dc:date>
    <item>
      <title>DNS NXNAattack bug</title>
      <link>https://community.isc2.org/t5/Industry-News/DNS-NXNAattack-bug/m-p/35858#M4526</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another attack on poor old DNS:&amp;nbsp; It is hard to believe in this technological world, we remain reliant on this insecure service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Dubbed NXNSAttack, &lt;A href="http://www.nxnsattack.com/shafir2020-nxnsattack-paper.pdf" target="_blank" rel="nofollow noopener"&gt;the flaw&lt;/A&gt; [PDF] can be abused to pull off a classic amplification attack: you send a small amount of specially crafted data to a DNS server, which responds by sending a lot of data to a victim's server. If you have an army of hacked PCs or devices – a botnet – at your command, and can find a DNS service that's vulnerable, you can theoretically generate enough network traffic to overwhelm a victim's system and knock it offline for all users."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.theregister.co.uk/2020/05/21/nxnaattack_bug_disclosed/" target="_blank"&gt;https://www.theregister.co.uk/2020/05/21/nxnaattack_bug_disclosed/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 22:08:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/DNS-NXNAattack-bug/m-p/35858#M4526</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-05-21T22:08:14Z</dc:date>
    </item>
  </channel>
</rss>

