Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary cyber

Rating
-
Sold
-
Pages
2
Uploaded on
15-06-2025
Written in
2024/2025

well for criminal information know

Institution
Course

Content preview

TTL:
Time to Live (TTL): TTL is a field in a DNS record that specifies the maximum
amount of time (in seconds) that the record can be cached by DNS servers and
clients before a fresh copy must be requested from the authoritative DNS server.

DNS cache poisoning, also known as DNS spoofing, is a malicious attack in which
false information is inserted into the cache of a DNS resolver. This can lead to
users being redirected to fraudulent websites without their knowledge, potentially
leading to data theft, malware infection, and other malicious activities.

Example Scenario
Legitimate Query:
1. User requests www.example.com.
2. DNS resolver queries authoritative DNS server.
3. Authoritative server responds with IP address 93.184.216.34.
4. Resolver caches the IP address and returns it to the user.

Poisoning Attempt:
1. Attacker sends a flood of fake responses to the DNS resolver, claiming to be
authoritative for example.com and providing a malicious IP address.
2. If the attack is successful, the resolver caches the malicious IP address.

After Poisoning:
1. User requests www.example.com.
2. Resolver returns the malicious IP address from its cache.
3. User is directed to the attacker’s malicious website.

Preventing DNS Cache Poisoning
1.DNSSEC (Domain Name System Security Extensions):
DNSSEC adds digital signatures to DNS data to ensure its authenticity. DNS
resolvers can verify these signatures to ensure responses have not been tampered
with.

2. Source Port Randomization:
DNS resolvers should use a random source port for each query, making it more
difficult for an attacker to predict the port and spoof a valid response.

3. Query ID Randomization:
Each DNS query includes a unique ID. Randomizing this ID makes it harder for an
attacker to match a fake response to a legitimate query.

4. Limit Cache Lifetime:
Reducing the TTL value for DNS records can help limit the duration of any potential
poisoning, as cached records will be refreshed more frequently.

5. Monitoring and Alerting:
Implementing monitoring systems to detect unusual DNS responses or traffic patterns
can help identify and mitigate potential attacks.

Fast-Flux:
Fast-flux is a DNS technique used by cybercriminals to evade detection and takedown
efforts by constantly changing the IP addresses associated with a domain. This is
achieved by using a network of compromised machines (often part of a botnet) to act
as proxies for the malicious server.

Types of Fast-Flux Networks
Single-Flux:
Only the A records (IP addresses) of the domain are rapidly changed. This is the
simpler form of fast-flux where each query to the domain returns a different IP

Written for

Course

Document information

Uploaded on
June 15, 2025
Number of pages
2
Written in
2024/2025
Type
SUMMARY

Subjects

$23.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
mithraqueen

Get to know the seller

Seller avatar
mithraqueen stuvia
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
9 months
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions