Dns cache poisoning, Computer Networking

Assignment Help:

DNS cache poisoning

The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers to the attack which comprises of the process of developing the DNS server cache of false information. This process generally maintains the record which will enable to maintain the wrong IP address. With DNS cache poisoning, the hacker can move the process of can control the process of handling all the incoming outgoing services of the DNS in terms of name resolution. The hacker can direct the specific address on the arrival of any request by the user. For example, if the user wants to access google.com, the hacker can direct him a page which cans google.com/something_.htm or simple another malicious web page. Relates to an attack consisting of making a DNS server.


Related Discussions:- Dns cache poisoning

What is an object server in client server environment, With an object serve...

With an object server, the Client/Server application is written as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). T

How is hop-by-hop segmentation of the ipv6 packets avoided, Question 1: ...

Question 1: (a) How are IPv4 addresses transformed into IPv6 addresses using IPv4 compatible addresses? (b) Name some of the simplifications that were introduced in IPv6.

Describe in a generic manner the packet of ipsec, Can you describe in a gen...

Can you describe in a generic manner the packet of IPSec

Create the registration request that mh sends to fa, Assume a network as de...

Assume a network as depicted below with a home agent (HA), a foreign agent (FA), a mobile host (MH), and a remote host (RH). The dotted box is the home location of MH. Assume MH's

Networking, What is the implication of increasing and decreasing subnet Bit...

What is the implication of increasing and decreasing subnet Bits?

Explain priority and reservation of token passing, Priority and Reservation...

Priority and Reservation Higher priority stations may possibly access the token sooner Each station has a priority code Since token passes by station waiting to t

What do you use the aux port for, The auxiliary port is used to link a mode...

The auxiliary port is used to link a modem to for dial backups.

What is exterior gateway protocol, What is EGP (Exterior Gateway Protocol)?...

What is EGP (Exterior Gateway Protocol)? It is the protocol the routers in neighboring autonomous systems use to recognize the set of networks that can be reached within or by

Conversion binary to hexadecimal, Qustion: Convert the binary number 10...

Qustion: Convert the binary number 10111100 to hexadecimal.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd