Dark Mode
Capec-589 Detail
DNS Blocking
Detailed Communications Software
Parents: 603
Threats: T63 T264 T267 T269 T289 T308 T311
An adversary intercepts traffic and intentionally drops DNS requests based on content in the request. In this way, the adversary can deny the availability of specific services or content to the user even if the IP address is changed.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-589 | capec | https://capec.mitre.org/data/definitions/589.html | |
| CWE-300 | cwe | http://cwe.mitre.org/data/definitions/300.html | |
| REF-473 | reference_from_CAPEC | http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf | Censorship in the Wild: Analyzing Internet Filtering in Syria, 2014, Sigcomm |
Not present
- This attack requires the ability to conduct deep packet inspection with an In-Path device that can drop the targeted traffic and/or connection.
Not present
Not present
| Availability |
|---|
| Other (Preventing DNS from resolving a request denies the availability of a target site or service for the user.) |
- Full URL Based Filtering: Filtering based upon the requested URL. URL String- based Filtering: Filtering based upon the use of particular strings included in the requested URL.