DrayTek UK Users' Community Forum

Help, Advice and Solutions from DrayTek Users

DNS Remote rebind attack prevention

  • warmsummer
  • Topic Author
  • User
  • User
More
23 Jul 2015 09:30 #1 by warmsummer
DNS Remote rebind attack prevention was created by warmsummer
Hi - it looks to me like the draytek routers would still suffer a from 'DNS remote rebind attack' (www.youtube.com/watch?v=0duYxPIx8gU)
Has anybody looked at this? - Is there a recommended approach for Vigor routers?

I assume a firewall rule would be best - but I'm not 100% sure how to construct it

s

Please Log in or Create an account to join the conversation.

  • adrianh54
  • User
  • User
More
24 Jul 2015 10:24 #2 by adrianh54
Replied by adrianh54 on topic Re: DNS Remote rebind attack prevention
Simple enough to deal with this rather old issue.

Use a good password on your router, they can't get in, the hackers look for routers that have the default admin/admin login.

Do not use Javascript and if you must have Java running do not allow it to auto run, use NO Script .

Use Open Dns , they provide security systems and prevent rebinding. Other public DNS providers also protect you.

Most decent UK ISP's set their DNS systems to prevent rebinding attacks.

You can get DNS checks and download Dns benchmark at GRC.com


https://www.grc.com/dns/dns.htm

https://www.grc.com/dns/operation.htm

https://www.grc.com/dns/benchmark.htm

Please Log in or Create an account to join the conversation.