DNS Rebinding - How DNS Rebinding Works

How DNS Rebinding Works

The attacker registers a domain (such as attacker.com) and delegates it to a DNS server he controls. The server is configured to respond with a very short time to live (TTL) record, preventing the response from being cached. When the victim browses to the malicious domain, the attacker's DNS server first responds with the IP address of a server hosting the malicious client-side code. For instance, he could point the victim's browser to a website that contains malicious JavaScript or Flash.

The malicious client-side code makes additional accesses to the original domain name (such as attacker.com). These are permitted by the same-origin policy. However, when the victim's browser runs the script it makes a new DNS request for the domain, and the attacker replies with a new IP address. For instance, he could reply with an internal IP address or the IP address of a target somewhere else on the Internet.

Read more about this topic:  DNS Rebinding

Famous quotes containing the word works:

    Men seem anxious to accomplish an orderly retreat through the centuries, earnestly rebuilding the works behind them, as they are battered down by the encroachments of time; but while they loiter, they and their works both fall prey to the arch enemy.
    Henry David Thoreau (1817–1862)