What dns hijacking of the way?

  What is DNS hijacking
  DNS hijacking, also known as domain name hijacking, it is to resolve on acquisition of control of a domain name by some means, to modify this domain analytical results, leading to access to the original IP address of the domain name transferred to the specified IP modified As a result you can not access or access to specific web site URL is false.
  IIS7 website monitoring
  test whether the site was hijacked, if the domain name is the wall, DNS information pollution detection.
  If you can impersonate a domain name server, then the IP address queries to IP address, in this case, Internet users can only see the home page, rather than the user wants the homepage achieved, and this is the basic principle of DNS hijacking.
  DNS hijacking is actually not really "black out" the other side of the site, but an imposter, a trickster nothing.
  DNS hijacking harm
  phishing scams
  online shopping, online payment is likely to be malicious pointing to other sites, increasing the risk of more leaks of personal accounts.
  Malicious ads appear within the site
  ranging from affecting network speed, weight is not the Internet
  DNS hijacking method
  1, using the DNS server for DDOS
  normal DNS server recursive query process can be used to DDOS. It is known to be assumed that the IP address of the machine, and then use that address as the source address of the transmission command parse. So that when using the DNS server recursive queries, DNS server responds to the original user. So if a sufficient number of control broilers, repeatedly performing the above, it would be the response information is derived from DDOS DNS server.
  If you have a sufficient number of broiler flocks, then it can be brought down to the network interruption occurs. Important challenge is to use the DNS server, because there is no direct communication with the host, hiding his whereabouts, so that the original data difficult to trace victims.
  2, DNS cache infection
  Using the DNS request, the DNS server of the data into the cache with a vulnerability among. Returns this cached information will be DNS access client to the user, so the user client access to the normal domain name directed to the settings on the page linked to horses, fishing, or to obtain the user's password information through bogus e-mail and other server services, leading to customer suffered further damage.
  3, DNS information hijacking
  TCP / IP system to avoid the insertion of fake data through a variety of ways such as serial number, if through dialogue and listening client and DNS server, you can guess the server responds to the client's DNS query ID. Each DNS packet includes a 16-bit associated ID number, DNS servers according to the position acquisition request source ID number. Before DNS server will respond to the fake user, thereby deceiving the client to visit a malicious Web site. The assumption was intercepted when submitted to a domain name server DNS resolution request message packet data, and then press the intent of the person intercepted a fake IP address information is returned as a response to the requester. The original requester will put this false IP address as the domain name and request it to be accessed, so he was deceived and elsewhere can not connect to the domain name that you want to access.
  4, DNS redirect
  DNS name queries redirected to a malicious DNS server, hijacked domain name resolution is completely under control.

Guess you like

Origin blog.51cto.com/14519715/2435049