From 1e3568a1c4f311ebf225fe615c558df4538c243e Mon Sep 17 00:00:00 2001 From: roadmap bot <135830415+roadmap-bot@users.noreply.github.com> Date: Sat, 17 Jun 2023 15:15:44 +0100 Subject: [PATCH] chore: add resource under cyber-security:networking-knowledge:understand-the-terminology:dns --- .../understand-the-terminology/106-dns.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md index 8f926c723..334934b44 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md +++ b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/understand-the-terminology/106-dns.md @@ -21,3 +21,6 @@ Some common DNS record types you might encounter include: - **TXT (Text) Record**: Contains human-readable or machine-readable text, often used for verification purposes or providing additional information about a domain. As an essential part of the internet, the security and integrity of the DNS infrastructure are crucial. However, it's vulnerable to various types of cyber attacks, such as DNS cache poisoning, Distributed Denial of Service (DDoS) attacks, and DNS hijacking. Proper DNS security measures, such as DNSSEC (DNS Security Extensions) and monitoring unusual DNS traffic patterns, can help mitigate risks associated with these attacks. + +- [DNS in detail (TryHackMe)](https://tryhackme.com/room/dnsindetail) +- [DNS in 100 Seconds (YouTube)](https://www.youtube.com/watch?v=uvr9lhugayu) \ No newline at end of file