Skip to content
SENKI
Surfing Internet Security & Resiliency as we thrive, heal, and grow in this life ….
  • Practical Security Guides, Projects, & Workbooks
    • DDoS Resiliency & Attack Preparation Workbook
      • DDoS Resiliency Workshop – 2022
      • DDoS Extortionist’s Behaviors
      • Operator’s Security & Resiliency Toolkit
      • Expected DoS Attacks – 10 Steps to Prepare for the Pain
      • 7 Habits of Highly Effective Cyber-Criminals
      • BGP Route Hijack – What can be done Today?
      • Preparing for DOS Attacks – the Essentials
        • Remote Triggered Black Hole (RTBH) Filtering
        • Monitoring Your Network for Malware, SPAM, BOTNET, and other Infections
        • Study Materials for Operational Security and DOS Defense
          • US’s National Strategy to Secure Cyberspace (2003)
        • SLA as a Security Tool
        • Remediating Violated Customers
        • Open Source Threat Intelligence Feeds
      • The History of DDoS and DoS
    • Network Operations & Scaling
      • Operator’s Security Toolkit – Main Page
        • The Service Provider Security “Bootcamp”
          • June 2014 Workshop Slides
          • Indonesia SP Workshops
          • CommunicAsia 2015
          • APRICOT 2012 Network Security Workshop
          • June 2014 Workshop Slides
          • Telecoms Security Workshop 2012
          • MAAWG 2012 Security Workshop
      • ISP Workshop Program
        • ITU Africa Telecom 98 IXP Demonstration
        • Singapore Internet Backbone (SIB)
      • Public Cloud DNS Resolvers (which offer services)
      • DNS Latency and Performance Test Tools
      • Network Operations Groups (NOGs)
    • Vendor Security
      • Meaningful Security Conversations with your Vendors
      • IoT Security Standards & Frameworks
    • Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers
  • Empowerment
    • Leveraging Credit Cards – Principles that Maximize Gain while Preventing Pain
    • Effective Linkedin Connections – Building Your Network
    • Building and Investing in a Community of “Contacts”
    • Principles to invest in Linkedin for an Effective Impact
    • Programs that Empower Women Engineers
  • About Senki
    • Conference Talks, Workshops, and Webinars
    • Stay Connected with Senki’s Updates
    • Barry’s BIO
      • What Drives Barry?
      • Influential Reading List
    • I’ve got an exciting opportunity for you ….

Tag: DNS Hijacking

DNS is Under Attack - the Miscreant’s Offensive Playbook with a Defensive Counter

DNS is Under Attack – the Miscreant’s Offensive Playbook with a Defensive Counter

Our DNS is Under Attack is not something anyone wants to hear. DNS’s critical role known to the miscreants, DDoS Extortionist, DDoS Attackers, and other threat attackers. Taking out DNS is easier than trying to take down a website. Smart miscreants have a playbook of offensive DNS attack techniques that they can use against any

Categories

  • Conferences, Webinars, & Workshops
  • Cyberwar
  • DoD, DDoS, and Denial of Service
  • Empowering Humanity
  • Internet
  • Operator's Security Toolkit
  • Scaling
  • Security, Resiliency, and Scaling
  • Telecom
  • Threat Actors
  • Uncategorized
  • Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy
Theme by Out the Box