Overview#
DNS cache poisoning (
DNS Spoofing) is a
Spoofing Attack where the
attacker spoofs the
IP Address DNS entries for a target
website on a given
DNS server and replaces them with the
IP Address of a server under their control.
Normally, a networked computer uses a DNS resolver provided by an Internet Service Provider (ISP) or the computer user's organization. DNS resolvers are used in an organization's network to improve resolution response performance by caching previously obtained query results. Poisoning attacks on a single DNS server can affect the users serviced directly by the compromised server or those serviced indirectly by its downstream server(s) if applicable.
A server SHOULD correctly validate DNS responses to ensure that they are from an authoritative source (for example by using DNSSEC); otherwise the server might end up caching the incorrect entries locally and serve them to other users that make the same request.
This attack can be used to redirect users from a website to another site of the attacker's choosing.
An
attacker uses DNS cache poisoning the
IP Address DNS entries for a target
website on a given
DNS server and replaces them with the
IP Address of a server under their control. The attacker then creates files on the server under their control with names matching those on the target server. These files usually contain
malicious content, such as computer worms or viruses. A user whose computer has referenced the poisoned
DNS server gets tricked into accepting content coming from a non-authentic server and unknowingly downloads the
malicious content. This technique can also be used for
phishing attacks, where a fake version of a genuine
website is created to gather personal details such as bank and credit/debit card details.
There might be more information for this subject on one of the following: