У нас вы можете посмотреть бесплатно Inside the DNS Battlefield: Malware, Tunnels & the Future of Network Defense | Defender’s Log или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Did you know that 90% of all malware uses DNS at some point in its attack chain? Whether it's for Command and Control (C2), data exfiltration, or "kill switches," DNS is the quiet backbone of modern cyberattacks. In this episode of The Defender’s Log, host David Redekop sits down with network security expert Johannes Weber to peel back the layers of the Domain Name System. From his early days fixing networks at 13-year-old LAN parties to becoming a top consultant for German system integrator SVA, Johannes shares deep insights into why DNS is the "ultimate double-edged sword" of the internet. 🔍 In This Episode, We Cover: The 90% Stat: Why malware relies so heavily on DNS and how it uses the protocol "exactly as intended" to bypass security. Creative Attacks: A deep dive into DNS Exfiltration and DNS Tunneling—how attackers chop up your data and sneak it out through port 53. The Defense Toolkit: How to move beyond simple blocklists to Deep Query Inspection, analyzing entropy, and label frequency. DNSSEC vs. DoH/DoT: Understanding the difference between authentication (DNSSEC) and privacy (DNS over HTTPS/TLS), and why DoH can be a nightmare for enterprise visibility. The "Ultimate Pcap": Johannes discusses his 15-year project—a single capture file containing over 90 protocols to help you master Wireshark. Home Lab Security: Why tools like Pi-hole are great for ads, but where they fall short against advanced threats like Domain Generation Algorithms (DGA). 🛠 Tools Mentioned: DNSviz: For visualizing the DNSSEC chain of trust. DNSdiag (DNS ping): For monitoring latency and availability across different DNS protocols. Iodine / DNScat2: Understanding the tools used for tunneling. Pi-hole: The gold standard for home network DNS filtering. 💬 Join the Conversation: Let us know your thoughts and your favorite DNS monitoring tools in the comments below! 👇 🚀 Connect with the Show: Subscribe for more deep dives into the "Defenders" world. Here are the links we've talked about: Johannes Weber, LinkedIn: / johannes-webernetz Johannes' Security-as-a-Podcast Apple: https://podcasts.apple.com/de/podcast... Spotify: https://open.spotify.com/show/3LtunFq... DNS Exfiltration/Tunneling Tools: DNSteal: https://github.com/m57/dnsteal iodine: https://github.com/yarrick/iodine DNS Troubleshooting Tools: DNSViz: https://dnsviz.net/ DNSDiag: https://dnsdiag.org/ *DNS Blocklists for Pi-hole: * https://github.com/hagezi/dns-blocklists The Ultimate PCAP: https://weberblog.net/the-ultimate-pcap ⏱️ Chapters & Key Moments 00:00 – Why 90% of malware still depends on DNS 01:00 – A fun start: German names, dual identities & cultural overlaps 03:00 – Johannes’ origin story: LAN parties → network engineer → security consultant 06:00 – You don’t need to code to thrive in network security 07:00 – DNS basics: recursive resolvers vs. authoritative servers 08:00 – How attackers abuse DNS “as designed” 10:30 – Lookalike domains & deceptive URL patterns 11:00 – DGAs (Domain Generation Algorithms) explained 12:00 – Newly registered vs. newly observed domains 14:00 – Aging domains & reputation‑based defense 15:00 – DNS exfiltration: how attackers sneak data out 16:00 – Step‑by‑step breakdown of DNS exfiltration 18:00 – DNS tunneling: when attackers turn DNS into a VPN 19:00 – Why signature‑based defenses fail 21:00 – Deep Query Inspection & entropy analysis 22:00 – Where DNS security belongs in your architecture 24:00 – TXT, NULL, A/AAAA abuse & blocking strategies 27:00 – DNS spoofing & cache poisoning 30:00 – DNSSEC: authentication vs. confidentiality 33:00 – DOH/DOT: privacy vs. visibility 36:00 – TLS interception & enterprise tradeoffs 39:00 – Securing roaming users in a VPN‑less world 41:00 – What Pi‑hole solves at home (and what it won’t) 43:00 – Johannes’ favorite tools: DNSViz, DNSDiag, DNSPing 44:30 – The Ultimate PCAP collection (15 years, 90+ protocols) 46:00 – Why Johannes teaches — and the next generation of defenders 48:00 – Closing thoughts & community resources