{"id":1461,"date":"2019-02-08T22:18:18","date_gmt":"2019-02-08T22:18:18","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1461"},"modified":"2020-05-06T10:27:00","modified_gmt":"2020-05-06T17:27:00","slug":"authoritative-dns-hijack-attacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/","title":{"rendered":"Authoritative DNS Hijack Attacks"},"content":{"rendered":"<p>As the leading enterprise DNS vendor in the world, we get asked about DNS security often.\u00a0 If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a head-scratching question\u2026\u00a0 How do we teach people to protect against a DNS attack that has no technical solution?<\/p>\n<figure id=\"attachment_1463\" aria-describedby=\"caption-attachment-1463\" style=\"width: 606px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1463\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Mr-Network-image.jpg\" alt=\"Authoritative DNS Hijack Attacks\" width=\"606\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image.jpg 606w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image-300x225.jpg 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><figcaption id=\"caption-attachment-1463\" class=\"wp-caption-text\">ciak<\/figcaption><\/figure>\n<p>What we found after contacting various customers, government agencies, and friends in the cybersecurity community:<\/p>\n<ul>\n<li>This is more widespread than most realize, and it&#8217;s surprisingly easy to do<\/li>\n<li>Some well-known bad people are actively using this attack<\/li>\n<li>HTTPS and DNSSEC are not going to save you if your DNS records are hijacked<\/li>\n<\/ul>\n<p>There are now quite a few excellent articles about this attack and our thanks to the folks at FireEye who published one of the first public write-ups available\u00a0<u><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/01\/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">HERE<\/a>.\u00a0<\/u>\u00a0\u00a0Additionally, on January 22, the DHS issued\u00a0<u><a href=\"https:\/\/cyber.dhs.gov\/ed\/19-01\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Emergency Directive 19-01<\/a><\/u>, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to FireEye\u2019s report.<\/p>\n<p>So, let\u2019s get straight to the\u00a0<strong>\u201c<em><u>how do I make sure my network is safe<\/u><\/em>\u201d<\/strong>\u00a0part of this blog.<\/p>\n<p><strong>Organizations should immediately:<\/strong><\/p>\n<p>Look at your public DNS records.\u00a0 For most organizations this is simple, Because you probably expose fewer than 20 public records (websites, email server, VPN) and verifying that they point at the right hosts should only take a few minutes.<\/p>\n<p>Using NSLOOKUP (most OSes):<\/p>\n<p>C:\\&gt;nslookup -type=any\u00a0<em>yourdomainname.com<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>&lt;Example Response&gt;<\/em><\/p>\n<p><em>Server:\u00a0 myserver.local<\/em><\/p>\n<p><em>Address:\u00a0 192.168.254.1<\/em><\/p>\n<p><em>Non-authoritative answer:<\/em><\/p>\n<p><em>infoblox.com\u00a0\u00a0\u00a0 internet address = 23.185.0.3<\/em><\/p>\n<p><em>infoblox.com\u00a0\u00a0\u00a0 nameserver = ns1.infoblox.com<\/em><\/p>\n<p><em>infoblox.com\u00a0\u00a0\u00a0 nameserver = ns2.infoblox.com<\/em><\/p>\n<p><em>infoblox.com\u00a0\u00a0\u00a0 MX preference = 10, mail exchanger = mxb-00333e01.gslb.pphosted.com<\/em><\/p>\n<p><em>infoblox.com\u00a0\u00a0\u00a0 MX preference = 10, mail exchanger = mxa-00333e01.gslb.pphosted.com<\/em><\/p>\n<p>You may see more data than this but pay special attention to your MX records as these are your external mail servers, your nameserver records (DNS servers), and your internet address record (typically your web server).\u00a0 These should all be addresses you recognize.<\/p>\n<p><strong>Note:<\/strong>\u00a0 If you try this from your internal network, you typically will not see these records as they are not used internally, so it\u2019s best to try from an external network or do the query directly on your external DNS server.<\/p>\n<p>If you are running an Infoblox appliance, \u00a0.\u00a0 Set up\u00a0<u><a href=\"https:\/\/docs.infoblox.com\/display\/NAG8\/About+DNS+Integrity+Check+for+Authoritative+Zones\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">DNS Integrity Check<\/a><\/u>\u00a0as a way to run automated consistency checks. While you are there ensure your automatic alerting is set up.<\/p>\n<p><strong>Protecting yourself going forward:<\/strong><\/p>\n<p>If you are using a public DNS service (many run their websites and public DNS records this way), spend the time to verify the authentication methods used by your domain registrars.\u00a0 As it turns out many of these companies have only basic security in place. Your managed DNS provider MUST provide additional layers of authentication before allowing changes (bad security is how we got into this mess).\u00a0 You should treat this access as sensitively as any banking or financial data because the results of a breach would be just as disastrous.\u00a0 Two factor authentication if available, is a good start.<\/p>\n<p>If you run a different DNS server, you probably have a SIEM or compliance tool that monitors when sensitive files change somewhere in your organization.\u00a0 Make sure to start watching the files on your DNS server that contain this information.\u00a0 The files are called \u201cZone Files\u201d and each public zone will have a file with the public records you checked.\u00a0 They are found in a directory specified within the\u00a0 \/etc\/named.conf file on the DNS server (e.g.: directory \u201c\/etc\/bind\/zones\u201d; ).\u00a0 These files are often named based on your domain and are easy to identify.\u00a0 You won\u2019t want to monitor all your DNS records as they change all the time, but for the public DNS records setting up an alert when changes are made will help when your boss asks:\u00a0<em>\u201cCould this happen to us?\u201d<\/em>.<\/p>\n<p><strong>That\u2019s is for the public Freak-out part of this article.<\/strong><\/p>\n<p>If all is good pat yourself on the back, have that second cup of coffee and why not go ahead and snag the last donut in the break room.\u00a0 But be aware even though you are good now, there are websites and mail servers being actively redirected at many other companies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the leading enterprise DNS vendor in the world, we get asked about DNS security often.\u00a0 If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit [&hellip;]<\/p>\n","protected":false},"author":184,"featured_media":1463,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,15],"class_list":{"0":"post-1461","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Authoritative DNS Hijack Attacks<\/title>\n<meta name=\"description\" content=\"As the leading enterprise DNS vendor in the world, we get asked about DNS security often. If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a head-scratching question\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authoritative DNS Hijack Attacks\" \/>\n<meta property=\"og:description\" content=\"As the leading enterprise DNS vendor in the world, we get asked about DNS security often. If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a head-scratching question\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-08T22:18:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"606\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Seeman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Seeman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/\"},\"author\":{\"name\":\"David Seeman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/1f4a8b574a53363b63e4ce6e03de4461\"},\"headline\":\"Authoritative DNS Hijack Attacks\",\"datePublished\":\"2019-02-08T22:18:18+00:00\",\"dateModified\":\"2020-05-06T17:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Mr-Network-image.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/\",\"name\":\"Authoritative DNS Hijack Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Mr-Network-image.jpg\",\"datePublished\":\"2019-02-08T22:18:18+00:00\",\"dateModified\":\"2020-05-06T17:27:00+00:00\",\"description\":\"As the leading enterprise DNS vendor in the world, we get asked about DNS security often. If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a head-scratching question\u2026\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Mr-Network-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Mr-Network-image.jpg\",\"width\":606,\"height\":454,\"caption\":\"ciak\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/authoritative-dns-hijack-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Authoritative DNS Hijack Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/1f4a8b574a53363b63e4ce6e03de4461\",\"name\":\"David Seeman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_184_1571767328-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_184_1571767328-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_184_1571767328-96x96.jpg\",\"caption\":\"David Seeman\"},\"description\":\"David Seeman has been in the networking and Information Security world for most of his life. He has worked for major personal computer, telecommunication equipment, and information security software manufacturers in both operations and product design. He enjoys attacking real-world challenges while partnering with customers and developers. A huge proponent of Agile methods and winning as a team. David holds many industry certifications and lives within the bright lights of Las Vegas.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/david-seeman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Authoritative DNS Hijack Attacks","description":"As the leading enterprise DNS vendor in the world, we get asked about DNS security often. If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a head-scratching question\u2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Authoritative DNS Hijack Attacks","og_description":"As the leading enterprise DNS vendor in the world, we get asked about DNS security often. If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a head-scratching question\u2026","og_url":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/","og_site_name":"Infoblox Blog","article_published_time":"2019-02-08T22:18:18+00:00","article_modified_time":"2020-05-06T17:27:00+00:00","og_image":[{"width":606,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image.jpg","type":"image\/jpeg"}],"author":"David Seeman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Seeman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/"},"author":{"name":"David Seeman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/1f4a8b574a53363b63e4ce6e03de4461"},"headline":"Authoritative DNS Hijack Attacks","datePublished":"2019-02-08T22:18:18+00:00","dateModified":"2020-05-06T17:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/"},"wordCount":730,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image.jpg","keywords":["Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/","url":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/","name":"Authoritative DNS Hijack Attacks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image.jpg","datePublished":"2019-02-08T22:18:18+00:00","dateModified":"2020-05-06T17:27:00+00:00","description":"As the leading enterprise DNS vendor in the world, we get asked about DNS security often. If you have read some of our articles, you know we love a good technical solution to a problem, digging into protocol anomalies, reverse-engineering malware attack patterns, and the like. In this case, we were left with a bit of a head-scratching question\u2026","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Mr-Network-image.jpg","width":606,"height":454,"caption":"ciak"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/authoritative-dns-hijack-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Authoritative DNS Hijack Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/1f4a8b574a53363b63e4ce6e03de4461","name":"David Seeman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_184_1571767328-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_184_1571767328-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_184_1571767328-96x96.jpg","caption":"David Seeman"},"description":"David Seeman has been in the networking and Information Security world for most of his life. He has worked for major personal computer, telecommunication equipment, and information security software manufacturers in both operations and product design. He enjoys attacking real-world challenges while partnering with customers and developers. A huge proponent of Agile methods and winning as a team. David holds many industry certifications and lives within the bright lights of Las Vegas.","url":"https:\/\/www.infoblox.com\/blog\/author\/david-seeman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1461"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1461\/revisions"}],"predecessor-version":[{"id":1467,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1461\/revisions\/1467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1463"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}