Question

In: Computer Science

Give three different techniques that an attacker can use to make a victim send DNS requests...

Give three different techniques that an attacker can use to make a victim send DNS requests to domains chosen by the attacker.

Solutions

Expert Solution

Answer;

A DNS (Domain Name System) attack exploits the DNS towards land the user on a wrong website or server. They are three types of DNS attacks are:

  1. Pharming
  2. Phishing
  3. DNS cache poisoning

Now,

Pharming:

  • Here using pharming attack, the attacker can forge the genuine website through using DNS server software.
  • The victim believes it as real website then provides true information.

Phishing:

  • In this phishing attack, pharming attack provides mutual support.
  • After a fake website is created and presented in front of user, he/she assumes it as genuine site and provides it through all sensitive information such as email password, online banking information, and credit card details.
  • These are collected at the fake sites and used later without bringing to the notice of the owner.

DNS Cache Poisoning:

  • DNS Cache Poisoning is an attack in which the attacker exploits the vulnerabilities of the DNS system by directing the Internet traffic from the trusted servers to the fraudulent servers which resemble the trusted one.
  • In this exploit, the DNS cache is tricked to store a false DNS record.


Related Solutions

What are three different techniques a researcher can use to establish convergent validity of a measure?...
What are three different techniques a researcher can use to establish convergent validity of a measure? Explanation and examples please! -Research Methods and Statistics
Write a paper that compares three different DNS services. One of the DNS services should be...
Write a paper that compares three different DNS services. One of the DNS services should be your home ISP’s. Compare features such as cost, speed, security, usability, and other factors that may be of significance when selecting DNS for a business. Use Google to look up reviews for your selected DNS.
how are aseptic techniques similar and different in the lab and healthcare field? give three differences...
how are aseptic techniques similar and different in the lab and healthcare field? give three differences and three similarities.
Discuss the use of network management tools which have a relation with the DNS. (Give at...
Discuss the use of network management tools which have a relation with the DNS. (Give at least one tool which is not listed in the textbook and discuss its output)
Give examples of how HR management concepts and techniques can be of use to all managers.
Give examples of how HR management concepts and techniques can be of use to all managers.
Give examples of how HR management concepts and techniques can be of use to all managers.
Give examples of how HR management concepts and techniques can be of use to all managers.
Give an original example of a construct or concept that can be operationalized in three different...
Give an original example of a construct or concept that can be operationalized in three different ways, in other words that can be measured by three different indicator variables corresponding to three levels of measurement of the data – nominal, ordinal or interval. Example: the construct education Variable that measures number of school years completed – interval Variable that measures education as (i) less than high school diploma (ii) high school diploma (iii) some college (iv) bachelors degree (v) post-graduate...
List the three different ways that mRNA splicing can give rise to different mRNA transcripts.
List the three different ways that mRNA splicing can give rise to different mRNA transcripts.
What are the key elements of diagramming techniques? Name the commonalities between three different diagramming techniques.
What are the key elements of diagramming techniques? Name the commonalities between three different diagramming techniques.
Q90 A computer firm must send a group of three specialists to give a technical presentation...
Q90 A computer firm must send a group of three specialists to give a technical presentation to a potential customer. Five such individuals are anxious to attend, but only two are considered to have strong interpersonal skills. Since the specialists have equal levels of seniority, they have agreed to place their names in a hat and allow management to randomly select the three to attend the presentation. What is the probability that there will be at least one person with...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT