Beruflich Dokumente
Kultur Dokumente
ABOUT
T
his post looks at how an attacker can
intercept and read emails sent from one
email provider to another by performing a
DNS MX record hijacking attack. While our
research on the state of email delivery security
indicates that this attack is less pervasive than the
TLS downgrade attack discussed in a previous post,
it is equally effective at defeating email in-transit
encryption. This post explains how this attack
works, how it can be mitigated and to what extent
it also affects the security of a website. Before
delving intohow this attack works and
countermeasures, I will briefly summarize DNS and
DNS MX records for the readers who are not
familiar with this aspect of the Internet. If you are
familiar with this topic, you can skip the next two
sections.
BLOG POSTS,
Recent TA L K S A N D
P U B L I C AT I O N S
Blog post Dec 2017 Publication CCS 2017 Blog post Oct 2017