#DNSAttacks

2025-05-25

Types of DNS Attacks You Should Know βš”οΈπŸŒπŸ”

The Domain Name System (DNS) is a core part of how the internet works β€” and it’s also a prime target for attackers. Understanding DNS attack types is essential for defending network infrastructure.

πŸ› οΈ Common DNS Attack Types:

1. DNS Spoofing / Cache Poisoning
β†’ Injects false DNS data into a resolver's cache to redirect users to malicious sites.

2. DNS Tunneling
β†’ Encodes data into DNS queries/responses to exfiltrate data or establish covert C2 channels.

3. DNS Amplification (DDoS)
β†’ Exploits open DNS resolvers to flood a target with amplified traffic.

4. NXDOMAIN Attack
β†’ Overloads DNS servers with queries for nonexistent domains, degrading performance.

5. Domain Hijacking
β†’ Unauthorized changes to DNS records or domain ownership to take control of web traffic.

6. Typosquatting / Homograph Attacks
β†’ Uses lookalike domains to trick users into visiting malicious sites.

7. Subdomain Takeover
β†’ Targets misconfigured DNS entries pointing to expired resources (e.g., GitHub Pages, AWS buckets).

Why it matters:
DNS is often overlooked in security strategies, but it’s a critical attack surface. Proper monitoring, DNSSEC, and logging can reduce risk.

Disclaimer: This content is for educational and awareness purposes only.

#DNSAttacks #CyberSecurity #InfoSec #NetworkSecurity #EducationOnly #DNSHijacking #Spoofing #RedTeamAwareness #BlueTeamDefense

mansi18mans18
2025-04-24

10 Common DNS Attacks for SOC

Stay ahead of cyber threats! Learn how attackers exploit DNS and how your Security Operations Center can detect and defend against these tactics.
πŸ’»

Join our SOC Course - infosectrain.com/courses/soc-a

2024-08-03
2024-07-15

@jscalzi : please stop using a http links if websites support https.

By specifying vote.org (or vote.org/ which gives the same result) in a link, or by typing vote.org in the address bar of your browser, there are three possibilities:

1) the browser connects to the _real_ vote.org website;

2) the browser displays a certificate error (never continue in such a case);

3) extemely unlikely (see [1]): the browser connects to a fake website that managed to obtain a valid certificate for the vote.org domain name.

(Note: I used the Unicode '/' character instead of the regular slash char '/' to prevent Mastodon from hiding the protocol).

By default, _none_ of the popular web browsers prevents active (i.e. not passive) criminals from successfully conducting Man-in-the-Middle attacks - if the first connection-attempt uses http.

Most browsers _may_ TRY https first, but an attacker can block that request, forcing the browser to downgrade to http (if the user explicitly requested https, such a downgrade to http will _not_ happen).

Such attacks can be conducted in various ways, such as by using an "evil twin" WiFi access point (bleepingcomputer.com/news/secu) or by manipulating DNS replies to browsers.

Note: the domain "vote.org" is currently _not_ listed in the HSTS preload list (apparently it was removed because of stupidities): hstspreload.org/?domain=vote.o (being listed would _force_ browsers to use https, even if "the user" requested http by tapping on such a link).

See also the unnecessarily poor results in internet.nl/site/vote.org/2883

Unfortunately also @BleepingComputer regularly uses unnecessary http links in their articles.

[1] More info: infosec.exchange/@Bitwiper/112

@adamshostack

#http #https #httpsvshttp#httpvshttps #AitM #MitM #EvilTwin #DNS #DNSAttacks #DV #DomainValidated #DomainValidation #Certificates #TLSCertificates #httpsCertificates #httpsServerCertificates #ServerCertificates #Authentication #Impersonation

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst