Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

DNS Cache Poisoning, also known as DNS Spoofing, is a critical security vulnerability where an attacker injects false DNS records into a resolver’s cache, redirecting users to malicious sites. This attack exploits weaknesses in the DNS resolution process, allowing attackers to manipulate how domain names are resolved into IP addresses remotely.

NotificationsYou must be signed in to change notification settings

Priyabug/Implementation-of-remote-DNS-cache-poisoning-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 

Repository files navigation

Description

The goal of this project is for students to experience theremote DNS cache poisoning attack, commonly known as theKaminsky DNS attack.

TheDomain Name System (DNS) functions as the Internet's directory service, converting domain names into IP addresses and vice versa. This process of DNS resolution typically occurs seamlessly in the background. However,DNS Pharming attacks can disrupt this resolution process, redirecting users to unintended, often malicious, destinations.

This lab specifically examines theDNS Cache Poisoning attack, a particular method of DNS Pharming.


Languages and Utilities Used

  • 🐍Python
  • 🖥Ubuntu 20.04 VM

Environments Used

  • 💻Windows 10 (21H2)

Program Walk-Through

  1. DNS and How It Works
  2. DNS Server Setup
  3. DNS Cache Poisoning Attack
  4. Spoofing DNS Responses
  5. Packet Spoofing

✅ Conclusion

This lab provided apractical demonstration of theKaminsky DNS cache poisoning attack, showcasing how vulnerabilities in the DNS protocol can be exploited to redirect users to malicious destinations.


🔍 Key Takeaways:

  • Simulated aremote DNS cache poisoning attack usingpacket spoofing techniques.
  • Explored howDNS resolvers can be tricked into caching forged responses by exploitingnon-randomized transaction IDs and ports.
  • Gained deeper insight into howDNS resolution works and thetrust model it relies on.

🛡️ Security Implications:

This lab emphasized the importance of:

  • EnablingDNSSEC for integrity and authenticity of DNS data.
  • Usingsource port and transaction ID randomization to reduce predictability.
  • Regularlypatching and securing DNS infrastructure to mitigate pharming attacks.

By completing this project, we developed a strong understanding of both thetechnical implementation of the attack and thecritical defense mechanisms necessary to secure DNS systems in real-world environments.

About

DNS Cache Poisoning, also known as DNS Spoofing, is a critical security vulnerability where an attacker injects false DNS records into a resolver’s cache, redirecting users to malicious sites. This attack exploits weaknesses in the DNS resolution process, allowing attackers to manipulate how domain names are resolved into IP addresses remotely.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp