Once the hacker has gained access to a DNS server, they can poison the DNS records so that traffic is redirected to a bogus site, with the goal of possibly collecting username and password information or other credentials.
- [ Narrator ] Either on the internet,…or within the LAN,…resources are identified by a unique domain name.…In order to reach the resources,…a resolution is made…from the domain name…to the IP address.…On the network resources include…web servers for accessing websites,…mail servers for delivering email messages,…or application servers…for accessing software systems and databases remotely.…When requesting information from DNS…there are two types of servers.…
An authoritative server or a non-authoritative server.…An authoritative server contains a master set…of all the data that publishes DNS data…and is updated when there is a change in the data.…A non-authoritative server is a cache server…that retrieves DNS data and contains copies…of the normal back and forth user queries.…Although a hacker can poison the cache…to launch an attack on DNS, a more effective way…to compromise DNS is by changing the DNS server records…on the authoritative servers.…
The DNS server may run within the organization…or by a third party, such as a domain name registrar…
Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Sniffing network traffic
- Passive vs. active attacks
- Comparing IPv4 to IPv6
- MAC and macof attacks
- Investigating DHCP attacks
- Detecting ARP and DNS spoofing
- Sniffing tools and techniques
Skill Level Beginner
1. Sniffing Overview
2. MAC Attacks
6. Sniffing Tools and Techniques
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.