The Yo-Yo Attack: Bankrupting Cloud Infrastructure
A comprehensive guide to the Yo-Yo attack, an Economic Denial of Sustainability (EDoS) technique that targets auto-scaling mechanisms in cloud environments.
Feb 28, 2026Cybersecurity
The Domain Name System (DNS) is often called the "phone book of the internet." It translates human-friendly names like example.com into IP addresses like 93.184.216.34, which computers actually use to connect. Without DNS, the web would be much harder to use—imagine memorizing hundreds of numbers instead of simple names!
In this article, we'll explore how DNS works, its hierarchy, and how both attackers (Red Teams) and defenders (Blue Teams) think about DNS in cybersecurity.
When you type a domain into your browser (e.g., openai.com), your device doesn't know where that is yet. It asks DNS servers for the IP address so it can connect to the right server.
Think of DNS like asking a librarian for the location of a book:
DNS works in a hierarchical system, starting from your own device and extending all the way to global servers.
Local DNS Cache (Your Computer/Router)
Your operating system remembers DNS lookups for a while. If you recently visited github.com, your computer may already know the IP address.
Example (Linux/Mac):
# View cached DNS entries
sudo systemd-resolve --statisticsLocal Resolver (ISP or Corporate DNS) If your machine doesn't know, it asks a DNS resolver—usually provided by your ISP or company network. This resolver checks its own cache first.
Root Servers
If the resolver doesn't know, it starts at the top: the DNS root servers. These servers don't know exact websites but know where to find Top-Level Domains (TLDs) like .com, .org, or .net.
TLD Servers
These servers handle TLDs. For example, .com servers know the addresses of all authoritative name servers for .com domains.
Authoritative Name Servers
These hold the actual records for the domain. For openai.com, the authoritative server provides the final IP address.
DNS uses different record types to provide information:
Example (querying DNS with dig):
dig openai.com AOutput shows the IP address of openai.com.
Attackers often leverage DNS because it's trusted and always available.
Domain Enumeration Red teams gather subdomains to discover hidden services.
# Using dig for subdomain brute forcing
dig admin.example.com ADNS Tunneling
Attackers hide data inside DNS queries/responses to bypass firewalls. Tools like iodine and dnscat2 enable covert communication.
Typosquatting & Malicious Domains
Registering similar-looking domains (g00gle.com) to trick users into visiting phishing sites.
Always check the link before clicking it.
Defenders use DNS monitoring and configuration to detect and block threats.
DNS Logging & Threat Hunting Monitoring DNS queries can reveal suspicious domains. Security teams often ingest DNS logs into SIEM systems.
Blocking Malicious Domains
Using DNS firewalls or services like Quad9 (9.9.9.9) to block known bad domains.
Preventing DNS Tunneling Setting limits on DNS request size, monitoring unusual query patterns, and deploying intrusion detection rules.
DNSSEC (DNS Security Extensions) Adds cryptographic signatures to prevent spoofing or tampering with DNS responses.
Linux systems rely on DNS resolvers such as Unbound, BIND, or systemd-resolved. Below are common approaches.
Unbound is a validating, recursive DNS resolver that supports DNSSEC out of the box.
sudo apt update
sudo apt install unboundEdit the config file /etc/unbound/unbound.conf.d/dnssec.conf to enable DNSSEC:
server:
auto-trust-anchor-file: "/var/lib/unbound/root.key"
val-permissive-mode: no
val-clean-additional: yes
harden-dnssec-stripped: yesDownload root trust anchor:
sudo unbound-anchor -a "/var/lib/unbound/root.key"Restart Unbound:
sudo systemctl restart unboundExample (checking DNSSEC with dig):
dig +dnssec example.comLet's trace a lookup for openai.com step by step:
.com) → authoritative server.104.18.12.123.This entire process usually takes milliseconds.
Understanding DNS is foundational for anyone entering networking or cybersecurity. It's a system that seems simple at first—but plays a critical role in both attacks and defense.
Love it? Share this article: