DNS Server linuxLinux serverNETWORK ADMINISTRATIONS

DNS Cache Poisoning Attack Demo

• Used the attacker machine to send DNS cache poisoning responses to the server machine which poisoned the DNS server for the user
• The user machine served as the victim. When the user sends a DNS request to access a web server, “example.com”, it sends the DNS request to the server machine. The attacker’s goal is to spoof DNS responses and send back to the server.
• The user machine will then get the malicious DNS response from the attacker machine
• Use the dig command to find out the IP address of example.com. If the IP address is of the attacker machine, the attack is successful

source

by CyberCat

linux dns server

9 thoughts on “DNS Cache Poisoning Attack Demo

Comments are closed.