DNS spoofing
Summary
Premise
- attacker can send forged DNS responses to a victim resolver faster than the real DNS server
- MITM in the application layer
Attack
- when victim makes a DNS request
- respond with the same query ID but with a spoofed ip address
Attacker’s Goals
- redirect victim’s traffic -> availability
- phishing website, get victim’s data -> confidentiality
- perform actions as the victim -> integrity
Defense
- DNSSEC - authentication on DNS requests
Concept
Domain Name System(DNS)
- maps human readable URLs to IP addresses
- uses UDP
- a 16-bit query ID(QID) is sent alongside the query, if the QID of the response doesn’t match, then the client rejects it
the DNS is also a single point of failure for the network a DoS can target the DNS server to indirectly deny availability to another service
DNS spoofing
- as long as QID is known
- send a response with a spoofed IP address
- routes the user to a malicious server