DNS cache poisoning

(redirected from DNS poisoning)

DNS cache poisoning

Injecting false information into the caches of the DNS system so that future requests are diverted to another site. In July 1997, Eugene Kashpureff inserted fraudulent information into the DNS, causing users going to the Network Solutions website to be rerouted to his Alternic site. See DNS cache, DNSSec, DNS hijacking, DNS and pharming.
References in periodicals archive ?
Attackers apply redirection tracks via DNS poisoning so that bank customers are taken to malicious websites from where their credentials can be stolen.
So DNS poisoning is an attack against, for the most part,
To protect against the DNS poisoning attacks, Manos et al [25] proposed Anax, a DNS protection system that detects poisoned records in cache.
As part of the Prevx SafeOnline Partner Program, FirstBank will offer the software to its customers, giving them increased confidence when using its online banking services by protecting against online fraud attacks such as phishing, DNS poisoning, screen grabbing, man-in-the-browser and keystroke logging.
Whether it is a "Man-in-the-middle" Attack, DNS Poisoning, or Web Site or Host File Modification it is urgent that compromised systems be detected and resolved quickly.
Entre los primeros estan DNS poisoning, donde el pirata modifica las entradas de DNS de un servidor publico para redirigir hacia si mismo el trafico destinado a otro sitio.
Pharming is a highly sophisticated extension of the online confidence scam 'Phishing' and is best confined through a blended network security response' that eliminates threats including DNS poisoning, Trojan horse programs and key-logging spyware.
This is a form of DNS attack called DNS poisoning, the act of tainting the server's cache with incorrect routing information so illegitimate sites appear in a browser despite a legitimate web address being requested.
Swa Frantzen, from the SANS Internet Storm Centre, which monitors internet threats and says it has seen a recent slew of poisonings, told the magazine: 'We see the combination of DNS poisoning with other hostile actions as having a serious impact.
Plugging identification and authorization exploits like DNS poisoning can be a never-ending arms race with the DNS server constantly on the defensive.
A January 2010 report prepared by the Center for Strategic and International Studies (CSIS) titled, "In the Crossfire - Critical Infrastructure in the Age of Cyber-War," found 57 percent of 600 IT and security professionals polled had experienced DNS poisoning attacks - which DNSSEC is supposed to stop.
The Firewall works by applying DNS poisoning techniques to