ExamGecko
Question list
Search
Search

Related questions











Question 314 - 312-50v12 discussion

Report
Export

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?

A.
The attacker queries a nameserver using the DNS resolver.
Answers
A.
The attacker queries a nameserver using the DNS resolver.
B.
The attacker makes a request to the DNS resolver.
Answers
B.
The attacker makes a request to the DNS resolver.
C.
The attacker forges a reply from the DNS resolver.
Answers
C.
The attacker forges a reply from the DNS resolver.
D.
The attacker uses TCP to poison the ONS resofver.
Answers
D.
The attacker uses TCP to poison the ONS resofver.
Suggested answer: B

Explanation:

https://ru.wikipedia.org/wiki/DNS_spoofing

DNS spoofing is a threat that copies the legitimate server destinations to divert the domain's traffic.

Ignorant these attacks, the users are redirected to malicious websites, which results in insensitive and personal data being leaked. It is a method of attack where your DNS server is tricked into saving a fake DNS entry. This will make the

DNS server recall a fake site for you, thereby posing a threat to vital information stored on your server or computer.

The cache poisoning codes are often found in URLs sent through spam emails. These emails are sent to prompt users to click on the URL, which infects their computer. When the computer is poisoned, it will divert you to a fake IP address that looks like a real thing. This way, the threats are injected into your systems as well.

Different Stages of Attack of DNS Cache Poisoning:

- The attacker proceeds to send DNS queries to the DNS resolver, which forwards the Root/TLD authoritative DNS server request and awaits an answer.

- The attacker overloads the DNS with poisoned responses that contain several IP addresses of the malicious website. To be accepted by the DNS resolver, the attacker's response should match a port number and the query ID field before the DNS response. Also, the attackers can force its response to increasing their chance of success.

- If you are a legitimate user who queries this DNS resolver, you will get a poisoned response from the cache, and you will be automatically redirected to the malicious website.

asked 18/09/2024
Ajayi Johnson
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first