DNS Working:
- A computer sends a “question” to a DNS server, asking a question like “What is the IP address for google.com?”
- The computer gets an answer, and if the answer appears to match the question it asked, completely trusts that it is correct.
Cache Poison Attack:
To improve efficiency, DNS servers typically store results in a cache to speed further lookups. This is the typical configuration at ISPs. With cache poisoning an attacker attempts to insert a fake address record for an Internet domain into the DNS. If the server accepts the fake record, the cache is poisoned and subsequent requests for the address of the domain are answered with the address of a server controlled by the attacker. For as long as the fake entry is cached by the server (entries usually have a time to live -- or TTL -- of a couple of hours) subscriber's browsers or e-mail servers will automatically go to the address provided by the compromised DNS server.
A single attack on the DNS server affects the users attached to that server. The hacker exploits the DNS software. The attacker also uses DNS ID hacking to find the ID number of the user to poison the cache of the user. It is a kind of rerouting domain name to another IP address which may be phishing page of attacker. One successful cache poisoning attack can therefore affect many users.
This kind of attack is often categorized as a "pharming" attack and it creates several problems. First, users think they are at a familiar site, but they aren't. Unlike with a "phishing" attack where an alert user can spot a suspicious URL, in this case the URL is legitimate.
Another problem is that hundreds or even thousands of users can be redirected if an attacker successfully inserts a single fake entry into a caching server. The scale of the problem is amplified by the popularity of the domain being requested. Under these circumstances, even a moderately experienced hacker can cause a lot of trouble, obtaining passwords and other valuable or sensitive information.
Solution:
- Maximise the amount of randomness
- Disable open recusive name servers
those computers that need it. (e.g. your customers). This will still be able to execute the attack, but the exposure is constrained.
Turn off open recursive name servers, if possible, because they can be used for other types of attack like denial of service.
- Introduce security to the DNS
References:
- http://resources.infosecinstitute.com/attacks-over-dns/
- http://www.networkworld.com/article/2277316/tech-primers/how-dns-cache-poisoning-works.html
- https://www.iana.org/about/presentations/davies-viareggio-entropyvuln-081002.pdf
Really great blog..thanks author for sharing, please visit once at http://www.qosnetworking.com/
ReplyDeleteHey Guys !
ReplyDeleteUSA Fresh & Verified SSN Leads with DL Number AVAILABLE with 99.9% connectivity
All Leads have genuine & valid information
**HEADERS IN LEADS**
First Name | Last Name | SSN | Dob | DL Number | Address | City | State | Zip | Phone Number | Account Number | Bank Name | Employee Details | IP Address
*Price for SSN lead $2
*You can ask for sample before any deal
*If anyone buy in bulk, we can negotiate
*Sampling is just for serious buyers
==>ACTIVE, FRESH CC & CVV FULLZ AVAILABLE<==
->$5 PER EACH
->Hope for the long term deal
->Interested buyers will be welcome
**Contact 24/7**
Whatsapp > +923172721122
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040