Q: 7
[Security Architecture]
A senior security engineer flags the following log file snippet as having likely facilitated an attacker’s
lateral movement in a recent breach:
qry_source: 19.27.214.22 TCP/53
qry_dest: 199.105.22.13 TCP/53
qry_type: AXFR
| in comptia.org
------------ directoryserver1 A 10.80.8.10
------------directoryserver2 A 10.80.8.11
------------ directoryserver3 A 10.80.8.12
------------ internal-dns A 10.80.9.1
----------- www-int A 10.80.9.3
------------ fshare A 10.80.9.4
------------ sip A 10.80.9.5
------------ msn-crit-apcs A 10.81.22.33
Which of the following solutions, if implemented, would mitigate the risk of this issue reoccurring?
Options
Discussion
Option A. Disabling DNS zone transfers is what stops external AXFR attempts cold. Others help, but only A addresses the specific risk from the log. Pretty sure that's what CompTIA wants here, but let me know if you read it different.
Not convinced D would actually stop the AXFR issue, isn't that more about who can query for records, not who can pull zone transfers? The log points straight to a zone transfer being abused. A seems more direct for preventing this. Anyone see a use case where D would be better?
I don't think it's B. A is better here since disabling DNS zone transfers directly blocks AXFR, which is the real problem in the log. B might help, but authorized servers could still need TCP/53 for legit reasons. Open to being proven wrong though.
Disabling DNS zone transfers is the move here, so A. AXFR is the giveaway, and turning off zone transfers stops that kind of info leak directly. Pretty sure that's what they're after in the question, but open to other takes.
C/D? Disabling zone transfers seems like a trap here, I think DNS masking (C) might hide internal details better. D also feels reasonable since restricting queries limits outside exposure. Not 100% but C or D looks right if you want to actually block info leaks.
A since disabling DNS zone transfers stops AXFR attacks directly. D's a trap here, it doesn't address zone transfers themselves.
A is the way to go since disabling DNS zone transfers stops AXFR requests cold, which is how attackers can grab the whole zone file. D does lock things down but doesn't specifically fix the root issue. I think A fits best here, open to pushback.
Option D Limiting DNS queries to internal clients should stop outside parties from getting this info, right?
A tbh, unless that environment needs legit internal zone transfers that weren't mentioned here.
Pretty sure it's A. Disabling DNS zone transfers actually prevents AXFR, which is how attackers map out the internal environment. D tempts you but it doesn't stop zone transfers from authorized but compromised clients. If I'm missing something let me know.
Be respectful. No spam.