What is DNS?
The job of the Domain Name System, or DNS, is to convert IP addresses into domain names and vice versa. It enables computers to communicate with each other over the Internet and other networks, making it a critical infrastructure. DNS is a fundamental component of modern computer networks that helps users access websites and other online services by name rather than having to remember complex numerical IP addresses.
DNS Attacks
DNS attacks refer to
various malicious activities aimed at exploiting vulnerabilities in the Domain
Name System (DNS). These attacks target the DNS infrastructure, compromising
its integrity, availability, and security. Here are some common types of DNS attacks:
1.
DoS Attack
A simple DoS (Denial of Service) attack takes one device and one internet connection to attack a remote server. However, they are not very effective at overloading modern global networks.
2.
DDoS Attack
Attackers
utilize multiple servers and internet services to launch a DDoS (Distributed
Denial of Service) attack against a website. DDoS attacks establish a botnet of
compromised devices that execute malicious queries in the DNS system.
Attackers can use the computational power of devices worldwide to query
the target network continuously. DDoS attacks are classified into three types:
● Protocol
attack: This attack cripples existing server resources or other
network equipment like firewalls and load balancers.
● Application
layer attack: The attacker makes
queries that appear legitimate but exploits the target's weaknesses to crash
the web server.
● Flood
attack: Floods attempt to render
a server unreachable to legitimate traffic by 'flooding' its resources.
Related
Articles
➔ How to prevent DDoS attacks?
➔ DDoS Attacks: How They Are Evolving
3.
DNS Spoofing or DNS Cache Poisoning
DNS
spoofing or DNS cache poisoning diverts internet traffic to malicious websites
by leveraging security vulnerabilities in the DNS protocol. These are known as
man-in-the-middle attacks.
Related article - All About DNS Spoofing
4.
Fast Flux
During an attack, an attacker usually spoofs his IP address. Fast flux is a method for continuously updating location-based data to conceal the source of an attack. This will hide the attacker's true location, giving them the time they need to carry out the attack.
5.
DNS Hijacking
There
are three types of DNS hijacking:
● The attacker gains access to a domain
registrar account and modifies the DNS name server settings to point to a
server under their control.
● Malicious users can modify your domain's IP
address record to point to another address.
● Attackers can compromise a company's router and manipulate the DNS server settings, which are automatically distributed to each device when connecting to the network.
About InfosecTrain
InfosecTrain is a renowned global company
specializing in cybersecurity training and consulting services. We offer a CompTIA
Network+ online course to
help professionals gain network security knowledge.