tencent cloud

Feedback

CVM Domain Name Parsing Tampering Experiment

Last updated: 2024-09-26 15:47:37

    Background

    Chaos engineering experiments on CVM domain name parsing and tampering aim to test the CVM coping capability when CVM is facing the attack of DNS parsing and tempering. DNS parsing and tampering is a common network attack. Attackers tamper with DNS parsing results and redirect a website visited by users to a malicious website to steal sensitive information from users or perform other malicious acts. For this reason, CFG provides domain name parsing tampering experiments to test the coping capability and resilience of a business system in the situation of an attack so that business security and stability can be improved.

    Experiment Execution

    Step 1: Experiment Preparation

    Prepare a CVM instance object for the experiment.

    Step 2: Experiment Orchestration

    1. Log in to the Tencent Smart Advisor > Chaotic Fault Generator, go to the Experiment Management page, and click Create a New Experiment.
    2. Click Skip and create a blank experiment.
    3. Fill in the experiment information, and switch the default region to another region as needed. After filling in the basic information, click Next.
    4. Input action information, select Compute - CVM for Object Type, Click Add Instance, and select a CVM instance for the experiment objective.
    5. Click Add Now to add an experiment action, select Network Resources, click Domain name resolution tampering, and then click Next.
    6. Configure fault action parameters. Fill in the domain name and IP to be tampered with, separate multiple domain names with English semicolons, and then click Confirm.
    7. After the configuration of parameters is completed, click Next.
    8. Click Submit to create an experiment.

    Step 3: Experiment Execution

    1. Verify the parsing before a fault. Test domain name parsing through a ping qq.com command. The parsing is normal.
    2. Go to the Action Group 1, click Execute in the Fault Card, and inject a fault.
    3. After a successful fault injection, test the parsing through ping qq.com. It can be seen that qq.com domain name parsing has been tampered with.
    4. Click Execute in the Recovery Action Card for recovery.
    5. After a successful recovery, retest the parsing through ping qq.com, and it has recovered to normal.
    
    
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support