Dns spoofing - domain name server, Computer Networking

DNS spoofing

This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the secondly DNs system is implemented where the DNS server request another server for mapping. Also in the case of client server dialog, when a client sends request to DNS for mapping purpose. The hacker simply insertsor can say stuff the DNS server’s answer. This results in the processing of answer by answering with the source-address field by DNS server’s IP address in the packets’. Although this is not an easy way to modify the DNS reply. The DNS use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In order to misdirect the clients to customers, the hacker will try to impersonate the DNS reply so with the help of DNS spoofing, which gives regarding the requesting client, is misdirected. The DNS cache of the impersonated DNS can be done without touching the DNS cache.

Posted Date: 3/1/2013 3:02:42 AM | Location : United States







Related Discussions:- Dns spoofing - domain name server, Assignment Help, Ask Question on Dns spoofing - domain name server, Get Answer, Expert's Help, Dns spoofing - domain name server Discussions

Write discussion on Dns spoofing - domain name server
Your posts are moderated
Related Questions
Describe the advantages of Intranet to the organisation The most obvious advantage is that everyone with access to a computer terminal connected to the Intranet can obtain the

Explain the basic of Network Properties   The subsequent properties are related with interconnection networks. 1)  Topology: It refers how the nodes a network are systema

Verify Network Connectivity Step 1: Use the ping command to determine network connectivity. You can determine network connectivity using the ping command.  Note: If pings


What is redirector in Networking? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

What is WDM? WDM is conceptually the similar as FDM, except that the multiplexing and demultiplexing includes light signals transmitted by fiber optics channel.

Reliable  data  transfer over a channel bit error  rdt : 20 A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit erro


Explain about the Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on the  Internet. The Ghoper was formed as a piece of sof