Lisa Bock covers cache poisoning, which inserts bogus information into a DNS server’s cache with the goal of diverting traffic to the attacker's computer.
- [Instructor] Networks rely on DNS…to provide accurate information…on host name to IP address resolution.…If I want to go to a web page,…I rely on DNS to give me the correct address,…or else I might be redirected to a bogus site.…The same is with email, if an email server address…is incorrect, I'll get a bounce back…with a message that the server cannot be found.…When configuring a DNS server,…correct configuration is essential,…as a mis-configuration can lead to devastating problems.…
DNS can be compromised by poisoning the cache.…Cache is a temporary holding area for data.…It's designed so that devices that request…a response can get a quicker response.…Websites use caching so we can get…a quicker response when requesting a web page.…On our own system we have a cache of DNS records.…Let's take a look.…I'm at the command line interface,…and once in the command line interface,…I'll type in ipconfig /displaydns.…There are a lot of records in my DNS cache, as you can see.…
What you can see is Record Name, Record Type,…
Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Sniffing network traffic
- Passive vs. active attacks
- Comparing IPv4 to IPv6
- MAC and macof attacks
- Investigating DHCP attacks
- Detecting ARP and DNS spoofing
- Sniffing tools and techniques
Skill Level Beginner
1. Sniffing Overview
2. MAC Attacks
6. Sniffing Tools and Techniques
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.