Dns spoofing - domain name server, Computer Networking

DNS spoofing

This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the secondly DNs system is implemented where the DNS server request another server for mapping. Also in the case of client server dialog, when a client sends request to DNS for mapping purpose. The hacker simply insertsor can say stuff the DNS server’s answer. This results in the processing of answer by answering with the source-address field by DNS server’s IP address in the packets’. Although this is not an easy way to modify the DNS reply. The DNS use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In order to misdirect the clients to customers, the hacker will try to impersonate the DNS reply so with the help of DNS spoofing, which gives regarding the requesting client, is misdirected. The DNS cache of the impersonated DNS can be done without touching the DNS cache.

Posted Date: 3/1/2013 3:02:42 AM | Location : United States







Related Discussions:- Dns spoofing - domain name server, Assignment Help, Ask Question on Dns spoofing - domain name server, Get Answer, Expert's Help, Dns spoofing - domain name server Discussions

Write discussion on Dns spoofing - domain name server
Your posts are moderated
Related Questions
What is the difference between a hub and a switch? A hub acts as a multiport repeater. Though, as more and more devices connect to it, it would not be able to efficiently manag

In RIP why we have HOP count of 15?


Case study on SAN Providers and Products available in the market.

Computer Networks 1. Write about different network structures in use. 2. Explain the architecture and usage of ISDN. 3. Describe the concept of framing in Data Link Layer

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls


Parallel Construct The syntax of the parallel construct is as follows: #pragma omp parallel [set of clauses]  where clause is one of the following:  structured-block if(sca

Post Office  Protocols Version In computing  the post office protocol  version 3 (POP3) is an  application layer internet standard  protocols  used by  local e mail  clients

Uneven Load Distribution In the parallel computer, the problem is dividing into sub-problems and is assigned for computation to various processors. But sometimes the sub-probl