What is the cache poisoning?

cache poisoning is a term used to describe a common harmful attack against the servers of the domain name (DNS). When poisoning the DNS Hacker cache, they basically place false data to the DNS server, which can send people to a website that they did not intend to visit. Some vulnerabilities made it difficult for DNS operators to defend against this kind of attack, and hackers have many ways to use this approach for dangerous purposes.

The DNS system can be considered a mediator between the Internet and users. When people enter the World Wide web address, it is usually sent to the local DNS server, which determines the address of the Internet protocol (IP), is for this website. The addresses of the Internet protocol are a number of numbers, each between one and three numbers, separated by dots. In many cases, local DNS servers may not have each address stored locally, so they can contact the main server to get IP addresses for many requirements.

cache poisoning attacks are usually focused onLocal DNS servers than on the main servers, partly because they are not always provided. There are many different ways to poison the DNS cache. For example, if an individual has a physical access to the DNS server, he could simply change the cache directly. Another approach is that the hacker spam the server with fake answers that are formatted as if they came from the main server. Local DNS servers can have many problems with telling the difference between authentic answers and counterfeits, so they can simply believe that the answers are real and add them to the cache.

Sometimes the DNS cache poisoning can be quite random, but hackers often focus on specific sites. When a hacker targets a specific site, his goal could be to create a fake site that looks identical. This can be used to steal valuable user information such as passwords and other students.

Another purpose of cache poisoning may be to send people to the website contaminated MalwAREM. This may include everything from spyware to keyloggers and other software that violates the individual's privacy. Web users are often cautious and clever to avoid malware infection, but when they visit a credible website, there may be less vigilant. Hackers are often able to use cache poisoning so that users believe they visit trustworthy websites when they are not really.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?