Category: IT|Jul 3, 2016 | Author: Admin

What is DNS Cache Poisoning and How Does It Work ?

What Is Cache Poisoning?

What Is Cache Poisoning?

Cache poisoning is a kind of attack in which corrupted data is inserted into the cache database of DNS(Domain Name System) name server. The Domain Name System ( DNS ) is a system which associates domain names with respective IP addresses. Devices which are connected to the internet or a private network rely on the DNS for resolving URLs into their corresponding IP addresses. During a DNS cache poisoning attack, malicious party sends duplicate responses from an imposter DNS to reroute a domain name to a new IP address. The new IP address is most likely controlled by the attacker and is used to spread computer worms and other malware. Other sophisticated uses for DNS cache poisoning include denial-of-service attacks and man-in-the-middle attacks.

Cache Poisoning Attacks

Cache poisoning attacks are possible due to the existence of the exploitable vulnerabilities in DNS software.

If an attacker sent a forged or unoriginal DNS response, this duplicate response is cached by the real DNS name server. At this point, we consider the DNS cache as “poisoned.” Due to this, users that try to visit the corrupted domain will be rerouted to the new IP address chosen by the attacker. Users will continue to receive fake IP addresses from the DNS unless the poisoned cache was cleared.

DNS cache-poisoning attacks normally use elements of social engineering to make victims download the malware. The servers and websites which attackers use to replace the authentic IP addresses looks like legitimate ones but they actually contain malware in disguise. Attackers’ use of social engineering along with the fact that domain names still appear normal can make it very difficult for users to detect cache poisoning attacks. As a result, victims willingly download malicious content that they believe to be valid and from trusted sources.

Sponsored Ads:

Comments:


Struggling with VPN

Category: Microsoft|May 3, 2024 | Author: Admin

This is how Huawei tricked its way into the US

Category: IT|May 2, 2024 | Author: Admin

Edge 125 arrives in Beta with sleeping tab improvements and other changes

Category: IT|May 1, 2024 | Author: Admin

Now the iPad opens

Category: Apple|Apr 30, 2024 | Author: Admin

Woke up locked out of Apple ID on iPhone

Category: Apple|Apr 29, 2024 | Author: Admin

Google has a hidden collection of highly-addictive retro games

Category: Google|Apr 28, 2024 | Author: Admin

Google is officially a $2 trillion company

Category: Google|Apr 27, 2024 | Author: Admin

Snowden: “DO NOT use Reddit!”

Category: IT|Apr 26, 2024 | Author: Admin

Popular Google app used by millions set to close in a few weeks

Category: Google|Apr 25, 2024 | Author: Admin

Cheeky, YouTube!

Category: Google|Apr 24, 2024 | Author: Admin

This is the date Apple will reveal new iPads

Category: Apple|Apr 23, 2024 | Author: Admin

Only possible with VPN

Category: IT|Apr 22, 2024 | Author: Admin

Apple sidles into sideloading in the EU

Category: Apple|Apr 21, 2024 | Author: Admin

Report: Microsoft-OpenAI ownership might get conditional OK from EU regulators

Category: IT|Apr 20, 2024 | Author: Admin

Giant change at Google could change everything

Category: Google|Apr 19, 2024 | Author: Admin
more