SlideShare a Scribd company logo
0x20 hack
 DNS vulnerabilities are teh shitz
 The Dan Kaminskys find a way to
do dns cache poisoning… on
the Internet
 Everyone freaks out
 He gives some solutions like
DNSSEC
 Everyone goes… yeah right. See
you in 2013
 People freak out again
 Inject a fake DNS result into a caching DNS
server
 Clients requesting that hostname will be given
the malicious response
 Works for as long as TTL is set
 Example:
› Vulnerability in BIND exploited
› Injects a cached response for www.google.com
› Grandma goes to www.google.com, and is
redirected
0x20 hack
 DNSSEC (we’re getting there)
 Patch your DNS server (yes of course, but not an actual
solution)
 Disable caching (not realistic in most cases)
 Randomize Name Servers (helps limit the affect of a
poison)
 Prepending a nonce to queries (balls930282-
fwq.www.rochester2600.com - effective but “omg what’s
a nonce”)
 Removing duplicate queries (mitigate birthday attack)
 0x20 Hack
0x20 hack
0x20 hack
 Refers to the simplest hack to modify the case of a
DNS requests
 0x20 bit manipulation is lower CPU cost compared to
for example Python to change the case of a string
 Turns out every DNS server ever can handle this hack
 Requests need to generate a random bitmask
 Only works if the DNS server does not pay attention
to case
 No entropy for TLR or number domains but helps most
hostnames
www.rochester2600.com
WWW.ROCHESTER2600.COM
wWw.rOChesTer2600.CoM
wWW.ROCheSTeR2600.com
WWW.roCHEsTeR2600.COM
000 0000000000000 000
111 1111111111111 111
010 0110001000000 101
011 1110011010011 000
111 0011101010000 111
 Attackers must brute force all possible
combinations of upper and lower to
successfully poison your cache
 I didn’t know about this and love it’s
simplicity
 Hipster Tor
 A and a are 0x20 apart
 The 0x20 hack
 No one uses this anymore…history lesson
 Nothing. You’re not even looking at the
screen right now.
0x20 hack

More Related Content

DOC
Tên hàm
DOCX
Block buster
PPTX
Image based automation
PPTX
How [not] to throw a b sides
PPTX
28c3 in 15
PPTX
Salander v bond 2600
PDF
Just Mouse Jack Init
PPTX
Docker Security
Tên hàm
Block buster
Image based automation
How [not] to throw a b sides
28c3 in 15
Salander v bond 2600
Just Mouse Jack Init
Docker Security

Viewers also liked (7)

PPTX
Reinventing anon email
PPTX
Nsa and vpn
PPTX
Laverna vs etherpad
PPTX
Meek and domain fronting public
ODP
State of wifi_2016
PDF
Android Hacking
ODP
Introduction to ethereum_public
Reinventing anon email
Nsa and vpn
Laverna vs etherpad
Meek and domain fronting public
State of wifi_2016
Android Hacking
Introduction to ethereum_public

Similar to 0x20 hack (20)

PDF
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
PDF
DNS DDoS Attack and Risk
PDF
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
PDF
Hands-on DNSSEC Deployment
PDF
Build Dynamic DNS server from scratch in C (Part1)
PPTX
DNS.pptx
PDF
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
PPTX
HKNOG 5.0 - NSEC caching
PPT
ISP Network Analyzing Tactics
PDF
The Internet Is a Series of Tubes
PDF
DNS Attacks
PPT
Bo2004
PPTX
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
PDF
Minieri CS6262 Project Poster
DOCX
DNS spoofing/poisoning Attack Report (Word Document)
PDF
Day 2 Dns Cert 4a Cache Poisoning
PPTX
THOTCON - The War over your DNS Queries
PPTX
ION Bucharest - Deploying DNSSEC
PDF
dns-sec-4-slides
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
DNS DDoS Attack and Risk
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
Hands-on DNSSEC Deployment
Build Dynamic DNS server from scratch in C (Part1)
DNS.pptx
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
HKNOG 5.0 - NSEC caching
ISP Network Analyzing Tactics
The Internet Is a Series of Tubes
DNS Attacks
Bo2004
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Minieri CS6262 Project Poster
DNS spoofing/poisoning Attack Report (Word Document)
Day 2 Dns Cert 4a Cache Poisoning
THOTCON - The War over your DNS Queries
ION Bucharest - Deploying DNSSEC
dns-sec-4-slides

More from antitree (12)

ODP
Hardening ssh configurations
PPTX
Salander v bond b sides detroit final v3
PPTX
Pentesting embedded
PPTX
PPTX
Corporate Intelligence: Bridging the security and intelligence community
PPTX
Lock picking barcamp
PPTX
Lock picking 2600
PPTX
Anti tree firesheep
PPTX
Hackerspaces
PDF
Intro to IPv6 by Ben Woodruff
PPTX
Anonymity Systems: Tor
PPTX
Dll hijacking
Hardening ssh configurations
Salander v bond b sides detroit final v3
Pentesting embedded
Corporate Intelligence: Bridging the security and intelligence community
Lock picking barcamp
Lock picking 2600
Anti tree firesheep
Hackerspaces
Intro to IPv6 by Ben Woodruff
Anonymity Systems: Tor
Dll hijacking

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
NewMind AI Monthly Chronicles - July 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

0x20 hack

  • 2.  DNS vulnerabilities are teh shitz  The Dan Kaminskys find a way to do dns cache poisoning… on the Internet  Everyone freaks out  He gives some solutions like DNSSEC  Everyone goes… yeah right. See you in 2013  People freak out again
  • 3.  Inject a fake DNS result into a caching DNS server  Clients requesting that hostname will be given the malicious response  Works for as long as TTL is set  Example: › Vulnerability in BIND exploited › Injects a cached response for www.google.com › Grandma goes to www.google.com, and is redirected
  • 5.  DNSSEC (we’re getting there)  Patch your DNS server (yes of course, but not an actual solution)  Disable caching (not realistic in most cases)  Randomize Name Servers (helps limit the affect of a poison)  Prepending a nonce to queries (balls930282- fwq.www.rochester2600.com - effective but “omg what’s a nonce”)  Removing duplicate queries (mitigate birthday attack)  0x20 Hack
  • 8.  Refers to the simplest hack to modify the case of a DNS requests  0x20 bit manipulation is lower CPU cost compared to for example Python to change the case of a string  Turns out every DNS server ever can handle this hack  Requests need to generate a random bitmask  Only works if the DNS server does not pay attention to case  No entropy for TLR or number domains but helps most hostnames
  • 10.  Attackers must brute force all possible combinations of upper and lower to successfully poison your cache
  • 11.  I didn’t know about this and love it’s simplicity  Hipster Tor
  • 12.  A and a are 0x20 apart  The 0x20 hack  No one uses this anymore…history lesson  Nothing. You’re not even looking at the screen right now.