HOW DOES DNS SPOOFING WORKS :-
HOW DNS SPOOFING OCCURS?
DNS spoofing occurs in one of two ways:Tampering with a nameserver’s DNS resolver cache can be done either intentionally by the administrator, such as an ISP that wants to serve ads or censor content, or by a hacker. DNS Changer Malware Hackers can either attack the nameserver itself or end user devices. Tampering with an existing DNS server affects more people, but due to high levels of security that typically guard nameservers, is more difficult to pull off. Instead, hackers often set up their own malicious DNS nameservers rather than breaching an existing one. They then use any number of methods to distribute DNS changer malware to end user devices—computers and smartphones—and wifi routers. DNS changer malware covertly alters a device’s internet settings to point DNS requests to a malicious nameserver. They can then redirect victims who request legitimate websites to phishing and malware-infected sites. Besides end user devices, hackers may target wifi routers with DNS changer malware. A router can override the DNS settings specified in a computer or smartphone. This is particularly a threat when connected to open and public wifi hotspots.
HOW DOES DNS SPOOFING IS CARRIED OUT:
DNS spoofing is an overarching term and can be carried out using various methods such as:However, an attacker’s end goal is usually the same no matter which method they use. Either they want to steal information, reroute you to a website that benefits them, or spread malware. The most discussed method to perform DNS spoofing is using cache poisoning and MITM.
1. DNS Cache Poisoning
DNS servers cache the DNS translation for faster, more efficient browsing, attackers can take advantage of this to perform DNS spoofing. If an attacker is able to inject a forged DNS entry into the DNS server, all users will now be using that forged DNS entry until the cache expires. Once the cache expires, the DNS entry will return to normal as the DNS server will go through the complete DNS lookup process again. However, if the DNS server’s software still hasn’t been updated, then the attacker can replicate this error and continue funneling visitors to their website. If the malicious website is very similar to the website it is trying to impersonate, some users may not even notice the difference. Additionally, if the attacker is using DNS cache poisoning to compromise one company’s DNS records in order to have access to their emails for example, then this may also be difficult to detect2. Man in the middle (MITM)
The interception of communications between users and a DNS server in order to route users to a different/malicious IP address.