- DNS spoofing also known as pharming attack. As we know, using the Domain Name System (DNS), people can identify Web sites with human-readable names (Such as yahoo.com). And computers can continue to treat them as IP addresses (such as 120.10.81.67). For this, a special server computer called a DNS server maintains the mappings between domain names and the corresponding IP addresses. The DNS server could be located anywhere. Usually, it is with the Internet Service Provider (ISP) of the users. With this background, the DNS spoofing attack works as follows.
- Suppose that there is a merchant (Bob) whose site’s domain name is bob.com. And the IP address is 100.10.10.20. Therefore, the DNS entry for Bob in all the DNS servers is maintained as follows: www.bob.com 100.1 0.10.20
- The attacker (say, Trudy) manages to hack and replace the IP address of Bob with her own (say 100.20.20.20) in the DNS server maintained by the ISP of a user, say Alice. Therefore, the DNS server maintained by the ISP of Alice now has the following entry: bob.com 100.2 0.20.20
- When Alice wants to communicate with Bob’s site, her web browser queries the DNS server maintained by her ISP for Bob’s IP address, providing in the domain name (bob.com). Alice gets the replayed (Trudy’s) IP address, 100.20.20.20.
- Now Alice starts communicating with Trudy, believing him to be Bob.
- Such attacks of DNS spoofing are quite common and cause a lot of havoc. Even worse, the attacker does not have to listen to the conversation on the wire. He has to simply be able to hack the DNS Server of the ISP and replace a single IP address with his own.
- A protocol called as DNSSec is use to repeal such attacks.
Explain Pharming. (DNS Spoofing)
feel free to contact us info@mybscit.com
-
Implement Caesar Cipher in Network Security tybscit Semester 5
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes, Caesor Cipher in Network Security tybscit Semester 5, download bscit notes of Mumbai University, network security notes, network security notes for tybscit semester 5, network security practicals, 0
The following example explains Caesar Cipher in Network Security and its implementation. Click here to download the PDF
-
Modified Cesar Cipher
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes, download bscit notes of Mumbai University, Modified Cesar Cipher, network security notes, network security notes for tybscit semester 5, network security practicals, 0
Modified Caesar cipher is an extension to Caesar cipher. Caesar cipher is not good because it can be analyzed...
-
Implement Advance Encryption Standard algorithm
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes, download bscit notes of Mumbai University, Implement Advance Encryption Standard algorithm, network security notes, network security notes for tybscit semester 5, network security practicals, 0
The Following example explains Implement Advance Encryption Standard.
-
What are the typical phases of operation of a virus?
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, phases of a virus, phases of a virus in network security, tybscit network security phases of a virus, 0
The first stage is called Pre-trigger stage or the dormant stage. In this stage viruses lie dormant, and does...
-
Explain Symmetric and Asymmetric key cryptography together
Kaushik Kini, , Network Security, atul kahate notes network security, network security notes, Symmetric and Asymmetric key cryptography together, Symmetric and Asymmetric key cryptography together in network security, tybscit network security, tybscit network security Symmetric and Asymmetric key cryptography together, 0
Indeed, in practice, symmetric-key cryptography and asymmetric-key cryptography are combined to have a very efficient security solution. The way...
-
RC4 Algorithm in Network Security tybscit Semester 5
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes, bscit notes for mumbai university, network security notes, network security notes for tybscit semester 5, network security practicals, RC4 Algorithm, tybscit semester 5 practicals, 0
RC4was designed by Ron Rivest. It is based on stream cipher i.e. the encryption & decryption happens byte by...
-
Implement RSA algorithm in Network Security – Tybscit Semester 5
Chirag Deora, , Network Security, atul kahate notes network security, bscit notes for mumbai university, download bscit notes of Mumbai University, Implement RSA algorithm, network security notes, tybscit semester 5 practicals, 0
Click Here to download the PDF
-
Give the classification of Viruses
Kaushik Kini, , Network Security, atul kahate notes network security, different types of viruses, network security notes, notes for tybscit, viruses in network security, 0
Parasitic Virus:- his is the most common form of virus. Such a virus attaches itself to executable files and...
Green Computing Book
C++ Interview Questions
Categories
- Advance Java (15)
- Advance Sql (8)
- ASP.NET with C# (16)
- Computer Graphics (3)
- Cyber Law (22)
- Digital Electronics 16-17 (2)
- Fybscit Semester 1 (1)
- FYBSCIT Semester 1 Question Bank (2)
- Fybscit Semester 2 (1)
- Imperative Programming (6)
- Linux Administration (3)
- Unit 1 (3)
- Network Security (33)
- News (40)
- Posts (1)
- Professional Communication Skills (2)
- Project (1)
- Project Management (1)
- Software Testing (1)
- Tybscit Question Papers (11)
- Semester V (7)
- Semester VI (4)
Recent Posts
- TYBSCIT Semester 5 Question Paper and Solution November 2017 (C75:25)
- TYBSCIT Semester 5 Exam Dates of October 2017 CBSGS 75:25 Postponed
- Tybscit Semester 5 Question Paper & Solutions November 2016 (75:25)
- FYBSCIT Semester 1 Question Paper & Solutions – October 2016 (75:25)
- FYBSCIT Semester 2 Question Paper & Solutions – March 2017
Recent Comments
- Web Master on JSplitPane Example in Advance java – Tybscit Semester 5
- priya on JSplitPane Example in Advance java – Tybscit Semester 5
- Web Master on TYBSCIT Semester V KT Results Announced April 2016
- Web Master on TYBSCIT Semester V KT Results Announced April 2016
- Web Master on Question Bank for Operating System fybscit semester 1