DNS Cache Poisoning Attack the user types a web site into a browser that browser asks the local dns server for the address and takes the user to the desired website. A cache.dns files accommodates data with the IP addresses of all Internet root servers. DNS Cache has a retaining duration time, the
time to live (dns ttl) after the TTL has expired it will delete the information. Local dns servers make this process faster for multiple queries they cash addresses so requests don’t go to the Internet every time you make a new request. If the request is not in the Cache the local dns server cashers it them performs forwarding on the request to the Internet root master dns server on the Internet. Internet security and researchers recently found a new method of attack on the open-architecture of the DNS Caching system exploiting its flaws.
By hackers sending a request to the local dns the query is then forwarded to the Internet dns next the attacker then floods the local dns with fake and non-authentic data response. Local dns server finds the malicious site in its cash and forwards the user to the malicious web site. Such attacks are called farming they send people to a site that contain tools for steeling information and putting viruses your computer.
There is a patch that can stop this from happening.
No comments:
Post a Comment