Industry-Leading DNS Auditing
The DNS Institute enables domain owners and DNS professionals to monitor and check conformance and vulnerabilities of their DNS infrastructure, through scheduled protocol tests, vulnerability tests, alerts, news, and statistics with complete reporting. Our DNS auditing solutions enable organizations to proactively identify and remediate DNS misconfigurations and vulnerabilities, measure and manage risk, and ensure accuracy and compliance with no to little additional software or infrastructure costs.
The DNS Institute is a consulting and documentation service covering the Domain Name System and its security. Our offerings include: automated DNS monitoring, DNS server and client configuration reviews, custom DNS development, DNS server installations, DNS server conformance and regression testing, DNS zone data auditing, DNS vulnerability testing, server penetration testing, DNSSEC deployments, DNS performance evaluations, DNS installation and management instruction, DNS documentation, and more.
Contact us for a demo or free evaluation.
Recent Research
-
Summary of Analysis for Single Top Ranked Domain for Each TLD
The most popular domain for many TLDs had interesting DNS problems. -
Popularity Rankings for TLDs
Popularity Rankings table for 1200+ TLDs. The 10 most popular TLDs from the Tranco top sites list are com, net, ru, org, info, in, ir, uk, au, and de. -
DNS over IPv6 Research 2020-11 for Fortune 500 Companies
129 Fortune 500 companies didn't have working DNS over IPv6. -
DNSSEC Report 2020-10 for Top 100 Banking Institutions
Only 4.7% of the domains owned by the largest banks were DNSSEC signed. -
TLD Delegation and Nameserver Failures (2020-09)
An analysis of 1508 top-level domain names found many interesting and even critical problems in at least 20 TLDs, including DNSSEC failures. -
DNS Nameserver Counts for Top Million Websites (2020-08)
The most popular NS nameserver domain name was cloudflare.com. -
DNS Mistakes (Part 2): Lots of Typos
More mistakes often caused by typos, copy-and-paste issues, or misunderstandings for what is allowed in DNS. -
DNS Mistakes (Part 1): Missing or Added Trailing Dots
Technical mistakes caused with a missing trailing dot in zone files and for a trailing period appended when not meant to. - Potential Email Compromise via Dangling DNS MX
While the Dangling MX concept is already known, our paper also describes a novel vulnerability and research approach where the Dangling MX or other DNS target is an existing registered domain, but available for purchase or unknown third-party use. - IPv6 Report 2020-06 for US Government and Military Domains
651 (50%) US government domains had at least one IPv6 problem and 19% completely failed for IPv6.