Skip to main content

what is DNS Spoofing


Description: Domain Name Server (DNS) resolves the alphabetical domain names like www.example.com into respective IP addresses that is used for locating and communicating between nodes on the Internet. DNS spoofing is done by replacing the IP addresses stored in the DNS server with the ones under control of the attacker. Once it is done, whenever users try to go to a particular website, they get directed to the false websites placed by the attacker in the spoofed DNS server. There are mainly two methods by which DNS spoofing is carried out – DNS cache poisoning and DNS ID spoofing. In DNS cache poisoning, the local DNS server is replaced with compromised DNS server containing customized entries of genuine website names with attacker’s own IP addresses. Hence, when a request is sent to the local DNS server for IP resolution, it communicates with the compromised DNS server, resulting in the user being redirected to a false website planted by the attacker. In DNS ID spoofing, the packet ID and IP information generated for the resolve request sent by the client is duplicated with false information inside it. As the response ID matches the request ID, the client accepts the response containing the information that is not expected. Common tips to prevent DNS Spoofing include maintaining the DNS software up-to-date, maintaining separate servers for public and internal services and using secure keys to sign updates received from other DNS servers to avoid updates from non-trusted sources.

Comments

Popular posts from this blog

Termux Socal-Box command

termux 1st lstep Apt update 2nd step Pkg install git 3rd step git clone https://github.com/samsesh/SocialBox-Termux.git 4th step cd SocialBox-Termux 5th step chmod +x SocialBox.sh 6th step chmod +x install-sb.sh 7th step ./install-sb.sh 8th step ./SocialBox.sh

HOW to install darkfly

Sharma hacking What is DarkFly-Tool? DarkFly is an index of tool that will allow you to install any tool in single Click. This Tool will give you a list of the types of tools and after selecting any type, you will see all the available tools to perform that type of attack. for example: if you want to perform SMS Flooding attack, you can select the Spam category and you will get a list of all tools that will help you to perform SMS Flooding attacks . The advantage of installing this tool is that you don't have to search for a tool manually every time you wanna perform a different type of attack you can just use darkfly tool to suggest you the tools that are suitable for you. Now when you have found your tool you just have to select the tool by typing its Tool number and the Tool will be automatically installed in your Termux and you will instantly able to use it. NOTE: This post is only for educational purposes. I an...

TBomb in termux

FOR MOBILES ⚠️WARNING ! DON'T USE IT FOR ANY ILLEGAL PURPOSE WE SHARE THIS ONLY FOR EDUCATION PURPOSE 🌟 How to message bombing anonymously with the help of termux 🌟  🔺 Step 1 :- type ; apt update && apt upgrade  🔺 Step 2 :- type ; termux setup storage  ( give permission allow ) 🔺 Step 3 :- type ; pkg install git    🔺 Step 4 :- type ; pkg install python  🔺 Step 5 :- type ; pkg install python2  🔺 Step 6 :- type ; git clone https://github.com/TheSpeedX/TBomb 🔺 Step 7 :- type ; ls 🔺 Step 8 :-  type ; cd TBomb 🔺 Step 9 :- type ; ls 🔺 Step 10 :- type ; chmod +x TBomb.sh 🔺 Step 11 :- type ; ls 🔺 Step 12 :- type ; bash TBomb.sh  🔓 Boom one page unlock then press "Enter" the choose 1 for message bombing , choose 2 for call bombing now press code number of your country like India +91  Press enter  Then type target's number without +91 like 8**1*****910 Then press number of bombing message or calls then press...