FMA

Future Media Architects

FMA Leading DDoS exploit reveals a vulnerability in the latest version of Google’s DNS server – to exploit

DDoS exploit reveals a vulnerability in the latest version of Google’s DNS server – to exploit



DDoS attack is one of the most common types of malware used to compromise systems and steal data.

The attack can take many forms including phishing, malware-infected emails, or even botnets.

In a new study, researchers from Trend Micro analysed DNS exploits that were posted on botnet forums and discovered a new exploit.

The researchers found a new vulnerability in a DNS query that the DNS servers of the DDoS attacks use to identify the source of the DNS requests.

The new exploit has the ability to redirect DNS requests to malicious hosts, potentially opening up a new avenue of attack.

The vulnerability is due to a new configuration of the CNAME server used by the DNS server in the attack, which has not been tested in the wild before.

In order to exploit the vulnerability, the researchers had to configure their DNS server to use the new configuration and make use of its new DNS cache.

The DNS server uses a new algorithm to identify hosts, which means the new CNAME resolution will not be detected by the old one.

However, the new DNS resolution will still be able to respond to the DNS query and attempt to recover the DNS cache of the target server.

Once the attack has been launched, the DNS response can be used to redirect the DNS request to another DNS server.

The result is that the DFS server is now able to be used as the source to exploit.

This is not the first time that DNS has been used as a weapon in an attack.

In October, a similar vulnerability was discovered in a DDoS server used to attack Dyn, a major DNS provider, which exposed a new attack vector.

This vulnerability is the latest in a series of DNS vulnerabilities found by researchers.

TopBack to Top