- Practical Network Scanning
- Ajay Singh Chauhan
- 98字
- 2022-07-12 10:43:10
DNS protocol attacks
DNS spoofing or DNS cache poisoning: DNS spoofing occurs when particular DNS server records are altered to redirect traffic to the attacker. This redirection of traffic allows the attacker to steal data because it is hard for users to recognize the difference between an actual web page and a false web page.
In this example, users are trying to get the IP address for a real web server which is 1.1.1.1 but attackers have manipulated the DNS record and, consequently, users are redirected to the IP address for a fake website, which is 2.2.2.2:

推薦閱讀
- 云原生安全:攻防實踐與體系構建
- RESTful Java Web Services Security
- 深入淺出隱私計算:技術解析與應用實踐
- 黑客攻防入門秘笈
- 黑客攻防與無線安全從新手到高手(超值版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- 網絡運維親歷記 (網絡運維紀實文學)
- 網絡安全設計、配置與管理大全
- 網絡安全應急響應實戰
- 網絡用戶行為的安全可信分析與控制
- End to End GUI Development with Qt5
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 云計算安全:關鍵技術、原理及應用
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 社會工程:防范釣魚欺詐(卷3)