logo
DNS Abuse Techniques Matrix
Compromise of a non-DNS server to conduct abuse
  • English
  • Japanese
Initializing search
    • Index
    • Actions
    • Techniques
      • DGAs
      • Domain name compromise
      • Lame delegations
      • DNS cache poisoning
      • DNS rebinding
      • DNS server compromise
      • Stub resolver hijacking
      • Local recursive resolver hijacking
      • On-path DNS attack
      • DoS against the DNS
      • DNS as a vector for DoS
      • Dynamic DNS resolution (as obfuscation technique)
      • Dynamic DNS resolution: Fast flux (as obfuscation technique)
      • Infiltration and exfiltration via the DNS
      • Malicious registration of (effective) second level domains
      • Creation of malicious subdomains under dynamic DNS providers
      • Compromise of a non-DNS server to conduct abuse
      • Spoofing or otherwise using unregistered domain names
      • Spoofing of a registered domain
      • DNS tunneling - tunneling another protocol over DNS
      • DNS beacons - C2 communication
    • Stakeholders
    • Abuse Matrices

    Compromise of a non-DNS server to conduct abuse

    Internet attack infrastructure is a broad category, and this covers any non-DNS server. Many compromised servers, such as web servers or mail servers, interact with the DNS or may be instrumental in conducting DNS abuse. For example, compromised mail servers are one technique that may be used to send phishing emails.

    Previous
    Creation of malicious subdomains under dynamic DNS providers
    Next
    Spoofing or otherwise using unregistered domain names
    FIRST DNS Abuse Special Interest Group
    TLP:CLEAR