Dns spoofing - domain name server, Computer Networking

DNS spoofing

This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the secondly DNs system is implemented where the DNS server request another server for mapping. Also in the case of client server dialog, when a client sends request to DNS for mapping purpose. The hacker simply insertsor can say stuff the DNS server’s answer. This results in the processing of answer by answering with the source-address field by DNS server’s IP address in the packets’. Although this is not an easy way to modify the DNS reply. The DNS use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In order to misdirect the clients to customers, the hacker will try to impersonate the DNS reply so with the help of DNS spoofing, which gives regarding the requesting client, is misdirected. The DNS cache of the impersonated DNS can be done without touching the DNS cache.

Posted Date: 3/1/2013 3:02:42 AM | Location : United States







Related Discussions:- Dns spoofing - domain name server, Assignment Help, Ask Question on Dns spoofing - domain name server, Get Answer, Expert's Help, Dns spoofing - domain name server Discussions

Write discussion on Dns spoofing - domain name server
Your posts are moderated
Related Questions
Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the

Virtual channel is normally a link from one source to one destination, although multicast connections are also allowed. The other name for virtual channel is virtual circuit.

Question: a) One of the most important duties of a system administrator is to protect the information that is stored on network servers. In the same context, describe both Ma

What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

simple introduction,defination and with example & digram

Can you determine routing loop issue in RIP protocol?

Many benefits of configuring VLAN as listed below: • Performance Enhancements: It reduces heavy load on the network by permitting operations at lower latencies by using VLAN t

Thus now you know how packets travel from one computer to another computer over the Internet. however what's in-between? What in fact makes up the Internet infrastructure or backbo

Q. Illustrate Error Detection-Simple Parity Check? Error Detection-Simple Parity Check A redundant bit called as Parity Bit? is added to every data unit. Even Pa

Programming Based on Message Passing As we know, the programming model based on message passing uses high level programming languages like C/C++ along with a number of message