{"id":1203,"date":"2018-06-15T19:31:58","date_gmt":"2018-06-15T19:31:58","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1203"},"modified":"2020-05-06T10:27:05","modified_gmt":"2020-05-06T17:27:05","slug":"4-most-common-types-of-dns-based-attacks-to-be-aware-of","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/","title":{"rendered":"4 Most Common Types of DNS-based Attacks to be Aware of"},"content":{"rendered":"<p>The internet is a system of computers communicating with each other. But really, it\u2019s a system of people talking to each other, and using computers to do it. An important step in this chain is called the Domain Name Service, or DNS. Your domain name is the actual name of your website in English (or your native language), which links the IP address (a series of numbers, now including letters, used for more specific identification) of your site. The domain name registrar is the organization that manages the reservations of your domain name from the available combinations of letters in the world. The letters after the dot (Google.COM, Whitehouse.GOV) are called a Top Level Domain, or TLD.<\/p>\n<p>The Domain Name Service was initially designed without too many security considerations because, in the early days of the Internet, it was not designed with a huge user base in mind or with the notion that it could be misused. Therefore the DNS protocol is vulnerable to attack and abuse. A new software is always being written to improve the efficiency and safety of the protocol, but, as in the real world, a door that opens is a door that can be forced open.<\/p>\n<p>Here are some of the attacks you should know about.<\/p>\n<h1 id=\"toc-hId-474203892\">Malware<\/h1>\n<p><strong>What it is:<\/strong><br \/>\nMalware is a catch-all word that includes any type of trojan horse, spyware, viruses and worms, ransomware, spyware, and so on. Basically, anything that turns your computer from a tool that you use into a tool that the hacker uses. Depending on the type of software, it may be monitoring your clicks to steal your passwords, using your computer\u2019s or\u00a0<a href=\"https:\/\/getcrm.com\/blog\/crm-security\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">even CRM\u2019s<\/a>\u00a0resources to power their cryptocurrency mining operation, or out and out block you from accessing your computer. Many times your computer is used for illegal activities, like being harnessed for a DDoS attack or hosting child pornography.<\/p>\n<p><strong>Best Defenses:<\/strong><\/p>\n<ul>\n<li>Keep your operating system updated regularly.<\/li>\n<li>Remove old software you don\u2019t use.<\/li>\n<li>Enable click-to-play plugins.<\/li>\n<li><a href=\"https:\/\/www.infoblox.com\/solutions\/data-protection-and-malware-mitigation\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS based security<\/a>\u00a0that uses a combination of reputation, behavioral and signature-based methods to protect your data and prevent the spread of malware.<\/li>\n<li>Ensuring your entire security architecture works in unison, sharing data and intelligence for\u00a0<a href=\"https:\/\/www.infoblox.com\/solutions\/threat-containment-and-operations\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">rapid threat containment<\/a><\/li>\n<\/ul>\n<h1 id=\"toc-hId-1361707573\">DDoS Attacks<\/h1>\n<p><strong>What it is:<\/strong><\/p>\n<p>Distributed Denial of Service, or sometimes just Denial of Service, means to overwhelm a service provider\u2019s or an enterprise\u2019s infrastructure with far greater requests than their capacity. If you\u2019ve ever seen those old comedy sketches where a person comes back from a vacation, opens the door, and is immediately buried by stacks of unread mail, it\u2019s something like that.<\/p>\n<p>Arranging a DDoS can cost only $150 on the black market, but the cost to you of a successful attack has been<a href=\"https:\/\/www.infoblox.com\/resources\/webinars\/avoiding-business-disruption-from-advanced-ddos-attacks\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u00a0estimated<\/a>\u00a0at $100-$6,000 every minute\u2014not counting the collateral effects of losing customers; on top of that, the DDoS is sometimes a cover for injecting even worse malware.<\/p>\n<p><strong>Best Defenses: \u00a0<\/strong><\/p>\n<ul>\n<li>A cloud-based anti-DDoS solution that can filter or absorb attacking traffic.<\/li>\n<li>DNS based DDoS protection built into DNS servers that can mitigate not just volumetric DNS DDoS but also lower volume exploits and anomaly attacks that can crash the DNS server<\/li>\n<\/ul>\n<h1 id=\"toc-hId--2045756042\">Cache Poisoning<\/h1>\n<p><strong>What it is:<\/strong><br \/>\nAlso known as \u201cDNS Spoofing,\u201d this is another technique that corrupts the domain name system. Two terms to know are \u201ccache\u201d, which is space reserved in your computer\u2019s memory to more quickly load frequently accessed data, and \u201cDNS resolver\u201d, which is the mechanism that translates the IP address to the domain name on the client side (that\u2019s you). Much like your computer has a cache of data, the DNS resolver does too. So, when you look up your favorite search engine or social network, it won\u2019t waste a nanosecond looking up something it already knows. Cache poisoning is when the hacker tunnels into that cache and misdirects a domain name to an incorrect IP address. That website can, for example, look like your banking website, and steal your identity when you put your real password into their fake website.<\/p>\n<p><strong>Best Defenses:<\/strong><\/p>\n<ul>\n<li>Limit recursive queries<\/li>\n<li>Store only data related to the requested domain<\/li>\n<li>Maintain DNS cache to delete old IP addresses that aren\u2019t frequently used<\/li>\n<\/ul>\n<h1 id=\"toc-hId--1158252361\">Data Exfiltration via DNS<\/h1>\n<p><strong>What it is:<\/strong><\/p>\n<p>Exfiltration, if you\u2019ve only heard the word from action movies, is a military term for \u201cescape.\u201d In the context of computers, it means the illicit release of data. It can be in-person or over a network. Data leaks can lead to ruined lives and losses of millions of dollars, if not more. On top of the damage done by the leak itself, lawsuits and criminal prosecutions can add additional penalties, some north of $<a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/anthem-pay-record-115m-settle-lawsuits-over-data-breach-n776246\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">100 million.<\/a><\/p>\n<p>Best Defenses:<\/p>\n<ul>\n<li>Make use of blacklists of randomly generated fake domain names that would if not blocked, direct traffic to these sites and possibly steal data within the data payload.<\/li>\n<li>Employ Cloud DNS protection that uses the latest algorithms capable of protecting data payloads.<\/li>\n<\/ul>\n<h3 id=\"toc-hId-409309690\">Conclusion<\/h3>\n<p>The most incredible thing about security is the small amount of effort and money it takes to create catastrophic damage. Similarly, an ounce of prevention (and in this case: security) is worth many pounds of cure. There is no such thing as \u201cthe latest\u201d security updates, the only way to prevent, or at least significantly lower the risk, of being the victim of a cyber-attack is to have a defense in depth strategy to plug any security gaps like DNS, share data and threat intelligence across the entire security infrastructure and leverage multi-pronged approach for threat detection to detect not just known threats but also zero-day attacks.<strong>About the author:<\/strong><\/p>\n<p>Reuben Yonatan is the founder @\u00a0<a href=\"https:\/\/getvoip.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">GetVoIP<\/a>\u00a0&#8212; an industry leading business comparison guide that helps companies understand and choose a VoIP system for their specific needs. Follow on Twitter\u00a0<a href=\"https:\/\/twitter.com\/reubenyonatan\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@ReubenYonatan<\/a><\/p>\n<p><em>Note: This article is written by a guest blogger. The author is solely responsible for all opinions expressed in the article.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet is a system of computers communicating with each other. But really, it\u2019s a system of people talking to each other, and using computers to do it. An important step in this chain is called the Domain Name Service, or DNS. Your domain name is the actual name of your website in English (or [&hellip;]<\/p>\n","protected":false},"author":200,"featured_media":708,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[32,15],"class_list":{"0":"post-1203","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-malware","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>4 Most Common Types of DNS-based Attacks to be Aware of<\/title>\n<meta name=\"description\" content=\"The internet is a system of computers communicating with each other.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Most Common Types of DNS-based Attacks to be Aware of\" \/>\n<meta property=\"og:description\" content=\"The internet is a system of computers communicating with each other.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-15T19:31:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"198\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Reuben Yonatan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Reuben Yonatan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/\"},\"author\":{\"name\":\"Reuben Yonatan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5669e00b4c5f7a0f7e5b626642aa5b98\"},\"headline\":\"4 Most Common Types of DNS-based Attacks to be Aware of\",\"datePublished\":\"2018-06-15T19:31:58+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-10.png\",\"keywords\":[\"Malware\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/\",\"name\":\"4 Most Common Types of DNS-based Attacks to be Aware of\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-10.png\",\"datePublished\":\"2018-06-15T19:31:58+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"description\":\"The internet is a system of computers communicating with each other.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-10.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-10.png\",\"width\":300,\"height\":198},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"4 Most Common Types of DNS-based Attacks to be Aware of\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5669e00b4c5f7a0f7e5b626642aa5b98\",\"name\":\"Reuben Yonatan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a4f73c0483e0ce81ff2f763d9a022003776ceae37db21e8efe977dc3f37f658?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a4f73c0483e0ce81ff2f763d9a022003776ceae37db21e8efe977dc3f37f658?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a4f73c0483e0ce81ff2f763d9a022003776ceae37db21e8efe977dc3f37f658?s=96&d=blank&r=g\",\"caption\":\"Reuben Yonatan\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/reuben-yonatan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 Most Common Types of DNS-based Attacks to be Aware of","description":"The internet is a system of computers communicating with each other.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/","og_locale":"en_US","og_type":"article","og_title":"4 Most Common Types of DNS-based Attacks to be Aware of","og_description":"The internet is a system of computers communicating with each other.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/","og_site_name":"Infoblox Blog","article_published_time":"2018-06-15T19:31:58+00:00","article_modified_time":"2020-05-06T17:27:05+00:00","og_image":[{"width":300,"height":198,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-10.png","type":"image\/png"}],"author":"Reuben Yonatan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Reuben Yonatan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/"},"author":{"name":"Reuben Yonatan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5669e00b4c5f7a0f7e5b626642aa5b98"},"headline":"4 Most Common Types of DNS-based Attacks to be Aware of","datePublished":"2018-06-15T19:31:58+00:00","dateModified":"2020-05-06T17:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-10.png","keywords":["Malware","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/","url":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/","name":"4 Most Common Types of DNS-based Attacks to be Aware of","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-10.png","datePublished":"2018-06-15T19:31:58+00:00","dateModified":"2020-05-06T17:27:05+00:00","description":"The internet is a system of computers communicating with each other.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-10.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-10.png","width":300,"height":198},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/4-most-common-types-of-dns-based-attacks-to-be-aware-of\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"4 Most Common Types of DNS-based Attacks to be Aware of"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5669e00b4c5f7a0f7e5b626642aa5b98","name":"Reuben Yonatan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a4f73c0483e0ce81ff2f763d9a022003776ceae37db21e8efe977dc3f37f658?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a4f73c0483e0ce81ff2f763d9a022003776ceae37db21e8efe977dc3f37f658?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a4f73c0483e0ce81ff2f763d9a022003776ceae37db21e8efe977dc3f37f658?s=96&d=blank&r=g","caption":"Reuben Yonatan"},"url":"https:\/\/www.infoblox.com\/blog\/author\/reuben-yonatan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/200"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1203"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1203\/revisions"}],"predecessor-version":[{"id":1204,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1203\/revisions\/1204"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/708"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}