当前位置:网站首页>Use onedns to perfectly solve the optimization problem of office network
Use onedns to perfectly solve the optimization problem of office network
2022-07-07 17:40:00 【Lin [email protected]】
Preface
Enterprise Office , Do you often encounter the following problems :
- Some inexplicable applications are installed on your computer , Slow down the computer , Affect office efficiency ;
- There are always some advertising pop ups on the computer desktop from time to time , It's annoying ;
- There are other people who always open websites forbidden by the company during working hours , Like web games 、 Gambling websites, etc ;
- The company server always restarts inexplicably in the middle of the night , Suspected of being “ Mining in bad faith ”, But I can't find the specific infected file ……
It's a common problem , Probably DNS Hijack or encounter CSRF attack .
DNS hijacked
DNS Hijacking is domain name hijacking , By matching the original domain name to IP Address to replace , This allows users to access the wrong website , Or an attack that prevents users from accessing the website normally .
CSRF attack
CSRF, Cross-site request forgery ( The full English name is Cross-site request forgery), It is a method of holding a user to log in at the current time Web An attack method that performs unintended operations on an application .
Example :
- The user logs in to the bank , Didn't quit , The browser contains the user's identity authentication information in the bank .
- The attacker will falsify the transfer request , Included in the post .
- When the user keeps logging in the bank website , Browse posts .
- Fake transfer request together with authentication information , Send it to the bank website .
- Bank websites see authentication information , Think it is the legitimate operation of the user , Finally, it causes the loss of users' funds .
How to solve DNS Hijacking and avoidance CSRF attack ?
Method 1
solve DNS hijacked :
Directly through IP Address visit website , To avoid the DNS hijacked
Because domain name hijacking can only be carried out within a specific network , Therefore, some advanced users can make DNS Point to the normal domain name server to achieve normal access to the target web address , For example, computers are preferred DNS The address of the server is fixed as 8.8.8.8.
avoid CSRF attack
- Check Referer Field :HTTP In the header Referer The field records the HTTP The source address of the request . In general , Requests to access a security restricted page come from the same website , And if hackers want to do it CSRF attack , He can only build requests on his own website . therefore , Can be verified by Referer It's worth defending CSRF attack .
- Add validation token: stay HTTP Was added a request in the form of randomly generated parameter token, And build an interceptor on the server side to verify this token, If not in the request token perhaps token The content is not correct , Think it might be CSRF Attack and reject the request .
- Sensitive operation multiple check : For some sensitive operations , In addition to verifying the user's authentication information , You can also confirm by email 、 The verification code confirms multiple verification in this way .
Method 2
install OneDNS
OneDNS Protection principle
OneDNS Get the requested domain name , Real time collision with cloud intelligence base , Secure domain name stable and efficient resolution , Return resolution IP Give users access ; detected Malicious domain names are not resolved , Direct interception , Return to the interception page , Achieve security protection .
OneDNS install
It's easy to install , Direct will DNS The address to OneDNS Of IP address , Interception upon access .
版权声明
本文为[Lin [email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/188/202207071534044468.html
边栏推荐
- Cartoon | who is the first ide in the universe?
- 百度地图自定义样式向右拖拽导致全球地图经度0度无法正常显示
- Functions and usage of viewflipper
- serachview的功能和用法
- 跟奥巴马一起画方块(Lua)
- 基于RGB图像阈值分割并利用滑动调节阈值
- Function and usage of calendar view component
- Vscode three configuration files about C language
- 简单的loading动画
- Function and usage of textswitch text switcher
猜你喜欢
Pytorch中自制数据集进行Dataset重写
Functions and usage of viewswitch
机器人工程终身学习和工作计划-2022-
[video / audio data processing] Shanghai daoning brings you elecard download, trial and tutorial
【可信计算】第十三次课:TPM扩展授权与密钥管理
99%的人都不知道|私有化部署还永久免费的即时通讯软件!
Dateticket and timeticket, functions and usage of date and time selectors
Matplotlib绘图界面设置
Biped robot controlled by Arduino
mui侧边导航锚点定位js特效
随机推荐
【网络攻防原理与技术】第5章:拒绝服务攻击
Vscode three configuration files about C language
状态模式 - Unity(有限状态机)
使用 xml资源文件定义菜单
【网络攻防原理与技术】第4章:网络扫描技术
Numberpick的功能和用法
做软件测试 掌握哪些技术才能算作 “ 测试高手 ”?
Linux 安装mysql8.X超详细图文教程
Pro2:修改div块的颜色
本周小贴士#141:注意隐式转换到bool
【重新理解通信模型】Reactor 模式在 Redis 和 Kafka 中的应用
LeetCode1051(C#)
LeetCode 515(C#)
Ansible 学习总结(9)—— Ansible 循环、条件判断、触发器、处理失败等任务控制使用总结
第3章业务功能开发(用户登录)
【网络攻防原理与技术】第7章:口令攻击技术 第8章:网络监听技术
serachview的功能和用法
鲲鹏开发者峰会2022 | 麒麟信安携手鲲鹏共筑计算产业新生态
redis主从、哨兵主备切换搭建一步一步图解实现
Enum + Validation 的个人最佳实践 demo 分享