Dns spoofing - domain name server, Computer Networking

DNS spoofing

This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the secondly DNs system is implemented where the DNS server request another server for mapping. Also in the case of client server dialog, when a client sends request to DNS for mapping purpose. The hacker simply insertsor can say stuff the DNS server’s answer. This results in the processing of answer by answering with the source-address field by DNS server’s IP address in the packets’. Although this is not an easy way to modify the DNS reply. The DNS use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In order to misdirect the clients to customers, the hacker will try to impersonate the DNS reply so with the help of DNS spoofing, which gives regarding the requesting client, is misdirected. The DNS cache of the impersonated DNS can be done without touching the DNS cache.

Posted Date: 3/1/2013 3:02:42 AM | Location : United States







Related Discussions:- Dns spoofing - domain name server, Assignment Help, Ask Question on Dns spoofing - domain name server, Get Answer, Expert's Help, Dns spoofing - domain name server Discussions

Write discussion on Dns spoofing - domain name server
Your posts are moderated
Related Questions
To Distribution System from BSS We require to identify the AP as the first hop to the destination (B) A will receive an ACK from the AP - indicates frame successfully on

Systolic Array This interconnection network is a kind of pipelined array architecture and it is designed for multidimensional flow of data. It is used for executing fixed algor

Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you send a few paragraphs i

Categories to access the Intranet Persons who can find access to the Intranet can be put into three categories. 1.  Those who can enter the site 2.  Those who can access

Q. What is Source Routing? Source Routing - Sender of packet defines bridges and routes that packet should take - Complete path of bridge IDs and destination address i

Name the types of OSPF Configuration? Ans) There are Two Types of OSPF configuration A ) SINGLE AREA b) MULTI AREA

Linked List A linked list is a data structure composed of zero or extra nodes linked by pointers. Each node consists of two parts, as shown in Figure: info field having specifi

Allows for transmission and receiving of data concurrently

How is final different from finally and finalize ()? Final is a modifier which can be applied to a class or a method or a variable. final class can't be inherited, final method

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll