The Domain Name System (DNS) is the phonebook of the Internet. DNS servers provide the path through which Internet devices can look up web servers to access web content. The DNS translates human-readable domain names to computer-readable IP addresses.
An example of this translation is as follows:
A few relevant properties of DNS are as follows:
DNS is path-critical
DNS employs caching to minimize lookups
Threats related to DNS might include eavesdropping (an attacker can observe the DNS queries) or manipulation (an attacker can manipulate queries).
The illustration below shows these threats:
In this attack, the attacker modifies the DNS records to redirect the online traffic to a malicious website resembling the intended website.
The attacker can achieve this by associating a malicious IP address of their choice to a known domain name. This altered mapping of the domain known to a new IP address is saved in the DNS cache and can persist for seconds, weeks, or even months, referred to as cache poisoning.
Once the user enters the malicious website, this allows the attacker to steal the user’s private information or login credentials. Additionally, the attacker can cause the malicious website to install malware on the user’s computer.
A relevant defense against DNS spoofing is bailiwick checking. Only the DNS records from the domain of the name server queried by the user are accepted. So, for example, if a name server queried is edu.pk
, they only receive the additional DNS records from *.edu.pk
.
An attacker who cannot
The attacker generates a series of bogus name lookups, each with a different identification number, to win the race against the legitimate reply from the DNS Server. The attacker successfully poisons the cache and can now redirect the users to alternate servers, rather than the intended ones.
The primary defense against blind spoofing uses identification numbers difficult to guess (using a 32-bit identification number instead of a 16-bit one).
Generally, the most effective defense against DNS Attacks is the
To find out more about DNSSEC, click here.
Free Resources