Dns spoofing - domain name server, Computer Networking

DNS spoofing

This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the secondly DNs system is implemented where the DNS server request another server for mapping. Also in the case of client server dialog, when a client sends request to DNS for mapping purpose. The hacker simply insertsor can say stuff the DNS server’s answer. This results in the processing of answer by answering with the source-address field by DNS server’s IP address in the packets’. Although this is not an easy way to modify the DNS reply. The DNS use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In order to misdirect the clients to customers, the hacker will try to impersonate the DNS reply so with the help of DNS spoofing, which gives regarding the requesting client, is misdirected. The DNS cache of the impersonated DNS can be done without touching the DNS cache.

Posted Date: 3/1/2013 3:02:42 AM | Location : United States







Related Discussions:- Dns spoofing - domain name server, Assignment Help, Ask Question on Dns spoofing - domain name server, Get Answer, Expert's Help, Dns spoofing - domain name server Discussions

Write discussion on Dns spoofing - domain name server
Your posts are moderated
Related Questions

Q. Advantages of Fiber Optics? - Higher bandwidth in comparison to twisted-pair and coaxial cable is not limited by medium but by equipment used to generate and receive signals

State the list of protocols supported by the Intranet The following is the list of protocols supported by the Intranet: ARP: Address resolution Protocol is used to resol

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Multi Tasking Environment Multi tasking exploits parallelism by: 1)  Concurrently using the multiple functional units 2)  Pipelining functional units are pipe line toget

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD

Explain in brief -Ring Topolgy Comments 1 - A faulty connection amid two stations can cause network failure 2 - It's difficult to add a new station/device as it has to come betwe

Question 1 Write a note on a) Internet layer b) strict source routing Question 2 Explain the routing table of Solaris system Question 3 Explain following concepts a) MIM

When it comes to networking, what are rights? Rights refer to the authorized permission to perform exact actions on the network. Every user on the network can be assigned indiv