Lightboard Lessons: The DNS Water Torture Attack

A Domain Name System (DNS) Water Torture attack involves attackers sending non-existent subdomain requests to an Authoritative Name Server for a specific domain. These malicious requests consume the resources on the name server (and also on intermediate DNS resolvers) and significantly slow down the responses for legitimate requests. Ultimately, users are not able to access your web application, and then everyone has a bad day. <insert sad-face emoji here>

Check out this video to learn more about this attack and how F5 can help keep your web applications safe!


 

Related Resources:

Published Oct 11, 2018
Version 1.0

Was this article helpful?

No CommentsBe the first to comment