🖋️
Learn Write Share
  • About me
  • Android Bits
    • The Other Side to Usability - Part 1
    • The Other Side to Usability - Part 2
    • Building a synthetic task stack of multiple activities in Android
    • Linking a text having a phone number in Android
    • DROIDCON Italy
  • Security Bits
    • Threat Modelling for AI - Changing the way you view Trust Boundaries
    • Who Do You Think Owns Your Android Application?
    • Secure Infrastructure: Tools & Techniques
    • DNS rebinding attacks - Useful resources
    • Semgrep and Dependabot in path to production - SAST and SCA Tooling
  • AWS
    • AWS account access using saml2aws and assume-role
  • MySQL
    • Setting up MySQL
Powered by GitBook
On this page

Was this helpful?

  1. Security Bits

DNS rebinding attacks - Useful resources

PreviousSecure Infrastructure: Tools & TechniquesNextSemgrep and Dependabot in path to production - SAST and SCA Tooling

Last updated 4 years ago

Was this helpful?

During the recent pen testing workshop I attended, I was reminded of the attack that could allow remote access to the devices setup on your local network.

Picking up the quote from a blog: Put simply, DNS rebinding allows a remote attacker to bypass a victim’s network firewall and use their web browser as a proxy to communicate directly with devices on their private home network. By following the wrong link, or being served a malicious banner advertisement, you could inadvertently provide an attacker with access to the thermostat that controls the temperature in your home.

In this note, I just plan to share the resources I found very useful to understand and replay the attack.

Blog on Medium showcasing how to attack Private Networks from the Internet with DNS Rebinding :

My takeaway: We do not apply authorization on our local REST API thinking our router has it. Protocols like UPnP are built around this idea that devices on the same network can trust each other. This is the problem.

Blog on Wired.com detailing how millions of streaming devices are vulnerable to a retro web attack :

DNS rebinding attacks have been brought up many times in the past, but new features in Internet of Things devices including geolocation and collection of personal data make it something people should really be aware of. The problem is exacerbated by IoT devices having APIs intended for communication with other, unauthenticated devices on the network.

Blog on Lifehacker.com on how to prevent DNS rebinding attacks by adjusting your router :

https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325
https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerability/
https://lifehacker.com/prevent-dns-rebinding-attacks-by-adjusting-your-router-1827022291