Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
DNS spoofing
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Cyberattack using corrupt DNS data}} {{More citations needed|date=January 2012}} {{Use dmy dates|date=February 2024}} '''DNS spoofing''', also referred to as '''DNS cache poisoning''', is a form of computer security [[Security hacker|hacking]] in which corrupt [[Domain Name System]] data is introduced into the [[DNS resolver]]'s [[DNS cache|cache]], causing the [[name server]] to return an incorrect result record, e.g. an [[IP address]]. This results in [[Man-in-the-middle attack|traffic being diverted]] to any computer that the attacker chooses. Put simply, a hacker makes the device think it is connecting to the chosen website, when in reality, it is redirected to a different website by altering the [[IP address]] associated with the [[domain name]] in the DNS server.<ref>Hanley, Sinéad (2000-11-06). [http://ogobin.de/internet/%5bPaper%5d%20dns_spoofing.pdf "DNS Overview with a discussion of DNS Spoofing"] (PDF).</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)