2 cissp ® Official Study Guide Eighth Edition


Check the local cache (which includes content from the HOSTS file). 2



Download 19,3 Mb.
Pdf ko'rish
bet437/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   433   434   435   436   437   438   439   440   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

1.
Check the local cache (which includes content from the HOSTS file).
2.
Send a DNS query to a known DNS server.
3.
Send a broadcast query to any possible local subnet DNS server. (This step isn’t widely 
supported.)


TCP/IP Model 
469
If the client doesn’t obtain a DNS-to-IP resolution from any of these steps, the resolution 
fails, and the communication can’t be sent. DNS poisoning can take place at any of these 
steps, but the easiest way is to corrupt the HOSTS file or the DNS server query.
There are many ways to attack or exploit DNS. An attacker might use one of these 
techniques:
Deploy a rogue DNS server (also known as DNS spoofing or DNS pharming).

rogue 
DNS
server can listen in on network traffic for any DNS query or specific DNS queries 
related to a target site. Then the rogue DNS server sends a DNS response to the client with 
false IP information. This attack requires that the rogue DNS server get its response back 
to the client before the real DNS server responds. Once the client receives the response from 
the rogue DNS server, the client closes the DNS query session, which causes the response 
from the real DNS server to be dropped and ignored as an out-of-session packet.
DNS queries are not authenticated, but they do contain a 16-bit value known as the 
query ID
(QID). The DNS response must include the same QID as the query to be 
accepted. Thus, a rogue DNS server must include the requesting QID in the false reply.
Perform DNS poisoning. DNS poisoning
involves attacking the real DNS server and plac-
ing incorrect information into its zone file. This causes the real DNS server to send false 
data back to clients.
Alter the HOSTS file.
Modifying the HOSTS file on the client by placing false DNS data 
into it redirects users to false locations.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   433   434   435   436   437   438   439   440   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish