DNS Spoofing
DNS Spoofing
System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer (often the attacker's).
Contents
[hide]
1 Overview of the Domain Name System 2 Cache poisoning attacks 3 Variants o 3.1 Redirect the target domain's nameserver o 3.2 Redirect the NS record to another target domain 4 Prevention and mitigation 5 See also 6 References 7 External links
When a DNS server has received such non-authentic data and caches it for performance optimization, it is considered poisoned, supplying the non-authentic data to the clients of the server. If a DNS server is poisoned, it may return an incorrect IP address, diverting traffic to another computer (often the attacker's).[citation needed]
This technique can be used to direct users of a website to another site of the attacker's choosing. For example, an attacker spoofs the IP address DNS entries for a target website on a given DNS server, replacing them with the IP address of a server he controls. He then creates files on the server he controls with names matching those on the target server. These files could contain malicious content, such as a computer worm or a computer virus. A user whose computer has referenced the poisoned DNS server would be tricked into accepting content coming from a nonauthentic server and unknowingly download malicious content.
[edit] Variants
In the following variants, the entries for the server ns.target.example would be poisoned and redirected to the attacker's nameserver at IP address w.x.y.z. These attacks assume that the nameserver for target.example is ns.target.example.[citation needed] To accomplish the attacks, the attacker must force the target DNS server to make a request for a domain controlled by one of the attacker's nameservers.[citation needed]
Attacker's response:
Answer: (no response) Authority section: attacker.example. 3600 IN NS ns.target.example. Additional section: ns.target.example. IN A w.x.y.z
A vulnerable server would cache the additional A-record (IP address) for ns.target.example, allowing the attacker to resolve queries to the entire target.example domain.
Attacker's response:
Answer: (no response) Authority section: target.example. 3600 IN NS ns.attacker.example. Additional section: ns.attacker.example. IN A w.x.y.z
A vulnerable server would cache the unrelated authority information for target.example's NSrecord (nameserver entry), allowing the attacker to resolve queries to the entire target.example domain.