What is DNS Spoofing ? Last Updated : 31 Mar, 2022 Comments Improve Suggest changes 2 Likes Like Report Have you ever stumbled across emails and websites that seem suspicious but you aren’t sure if it has been authenticated or not? I am sure we all have seen an email or a website that has all of the signs of being suspicious and our spidey senses go off. I am writing this to help explain what you saw and the potential dangers of what you could’ve been a victim of. This article is about DNS spoofing. DNS spoofing or DNS cache poisoning is an attack in which altered DNS records are used to redirect users or data to a fraudulent website or link that is camouflaged as the actual destination. An example of this would be when you go to facebook.com on an unsecured network with no antivirus. If someone happens to be sniffing on your open port or has already done a man-in-the-middle attack, then they are able to corrupt the DNS records. Therefore, redirecting you to a fake Facebook page that is a replica of the official login page. When you type in your username and password they will be able to steal your login credentials and inject a virus or worm into your IP address. So going more into the details of what DNS spoofing is in the simplest of terms. Every computer and device has an IP address and every website has a domain name(www.google.com) that allows internet users to visit the page. The DNS or domain name system then maps out and plots out the domain name that users enter to the appropriate IP address to properly route the traffic. The sorting and routing is handled by the DNS servers. DNS poisoning is when a hacker injects a corrupt piece of DNS instructions into the DNS server and takes advantage of an exploit in the process of redirecting traffic. The corrupt piece of DNS data that is sent to the DNS server is now redirecting traffic to a fake login page that looks exactly like the official page. When the users enter their credentials, it is either being recorded through a keylogger or being sent in a .txt file to the hacker so they have the information stored in an alternate location. A way to interpret this process and vulnerability is to look at it in the form of something you can relate to. Let's say you are going to your favorite grocery store to get groceries. You have to get rice, canned beans, some bread, deli meat, etc. So you get to the grocery store and you see that obviously there are aisles where different items are located(this can be related to the many websites out there and domain names). So you grab all of your items and go to the checkout lines. Since all of the checkout lines are full you will usually have an attendant directing people to the next available opening in a checkout aisle(this is the DNS servers directing and routing all traffic to the websites). So you are directed to the next aisle and checkout and pay for all of your items but the cashier working there was not really an employee and has stolen everyone’s credit card information in that line(this is the hacker injecting a corrupt DNS entry into the DNS servers and redirecting users to the fake login page and stealing their login credentials). Comment D dtkalani Follow 2 Improve D dtkalani Follow 2 Improve Article Tags : Ethical Hacking Explore Ethical Hacking Tutorial 13 min read Introduction to Ethical HackingWhat is Hacktivism ? 11 min read The Hackers Methodology 4 min read Remote Access in Ethical Hacking 5 min read Information Gathering Tools for Kali Linux 5 min read ARIN in Ethical Hacking 3 min read Characteristics of Computer Networks 5 min read Foot Printing and ReconnaissanceWhat is DNS Footprinting? 6 min read Footprinting Through Search Engines 5 min read What is Whois Footprinting? 4 min read Footprinting Using Social Engineering Method 4 min read Scanning NetworksWhat is Credentialed Vulnerability Scan? 4 min read What are Scanning Attacks? 7 min read Malware Scan in Ethical Hacking 5 min read What is Running of a Malware Scan? 5 min read WAScan - web application security scanner in Kali Linux 2 min read What is TCP-ACK Scanning? 2 min read Port Scanning Techniques By Using Nmap 5 min read What is SYN Scanning? 3 min read What is UDP Scanning? 2 min read EnumerationCyber Security - Types of Enumeration 13 min read What is DNS Enumeration? 3 min read SMTP Enumeration 2 min read LDAP Enumeration 6 min read What is NTP Enumeration? 4 min read What is IPsec Enumeration? 4 min read What is NetBIOS Enumeration? 5 min read SNMP Enumeration 7 min read What is Security Testing in Enumeration? 4 min read System HackingWhat is System Hacking in Ethical Hacking? 2 min read What is Windows Hacking ? 6 min read Importance of Physical Security in Ethical Hacking 3 min read What is Non-Electronic Password Attack on a System? 3 min read Password Guessing Attack 5 min read Credential Stuffing in Ethical Hacking 2 min read Reverse Brute Force Attack in System Hacking 4 min read Brute Force Attack 2 min read What is a Default Password Attack Threat? 3 min read USB Drop Attack in System Hacking 5 min read What is Sniffing Attack in System Hacking? 4 min read How to Prevent Man In the Middle Attack? 5 min read How To Generate Rainbow Table Using WinRTGen? 4 min read What is Elcomsoft Distributed Password Recovery? 4 min read pwdump7 in System Hacking 3 min read FGDUMP in System Hacking 5 min read Password Auditing With L0phtcrack 7 Tool 5 min read What is Salted Password Hashing? 4 min read How to Defend Against Password Cracking of Systems? 6 min read How to Defend Against Wi-Fi Pineapple? 6 min read What is DLL Hijacking? 8 min read How to Prevent Privilege Escalation? 4 min read Malware AnalysisMost Popular Methods Used By Hackers to Spread Ransomware 3 min read What is Malvertising? Working and Examples 8 min read How to Find Trojan on Computers? 4 min read Malwares - Malicious Software 8 min read What is WannaCry and How does WannaCry ransomware works 5 min read Working of Stuxnet Virus 6 min read CryptoLocker Ransomware Attack 4 min read Storm Worm 3 min read What is Zeus Malware? 8 min read What is SQL Slammer Virus? 2 min read How to Install Trojan Virus on Any Computer? 5 min read Different Ways to Remove Trojan Horse Malware 5 min read How to Defend Against Botnets ? 5 min read What is Proxy Trojan? 3 min read What are Banking Trojans? 3 min read What is a Computer Virus? 9 min read Virus Hoax 2 min read Difference between Worms and Virus 5 min read Port Scanning Attack 3 min read What is System Integrity Check? 6 min read Code Emulation Technique For Computer Virus Detection 5 min read Heuristic Virus 6 min read How to Prevent Backdoor Attacks? 3 min read SniffingWhat are Active Sniffing Attacks? 6 min read What is Protocol Analyzer? 3 min read What is MAC Spoofing Attack? 5 min read How to Prevent MAC Flooding? 4 min read What is Port Stealing? 3 min read Dynamic Host Configuration Protocol (DHCP) 8 min read DHCP Starvation Attack 4 min read What is Rogue DHCP Server Attack? 4 min read What is ARP Spoofing Attack? 3 min read How to Prevent DNS Poisoning and Spoofing? 6 min read DNS Spoofing or DNS Cache poisoning 3 min read How to Detect Sniffer in Your Network? 5 min read Mitigation of DHCP Starvation Attack 5 min read Social EngineeringWhat is Social Engineering? Working, Types, Prevention and Impact 8 min read What is Insider Attack? 6 min read What is an Impersonation Attack? 6 min read What are Tailgating? 5 min read How Hackers Use Social Engineering to Get Passwords on Facebook? 4 min read Pretexting in Social Engineering 4 min read Credit Card Frauds 2 min read Active Social Engineering Defense (ASED) 6 min read Cyber Crime - Identity Theft 5 min read Penetration Testing - Software Engineering 9 min read Denial-of-ServiceDistributed Denial of Service DDoS attack 6 min read What are Bandwidth Attacks? 6 min read HTTP Flood Attack 9 min read ICMP Flood DDoS Attack 12 min read Ping Flood Attack 6 min read What is a Permanent DoS (PDoS) Attack? 6 min read What is Phlashing? 4 min read Like