DNS Spoofing Attacks

Поділитися
Вставка
  • Опубліковано 19 вер 2022
  • Download Our CCNA (200-301) Practice Exam for FREE
    kwtrain.com/cc...
    ***********************************
    In this video, you'll see how an attacker might launch a DNS Spoofing attack against your network, and we'll discuss how to defend yourself. For example, an attacker might launch a DHCP Spoofing attack, convincing your computer to use the attacker's DHCP server. Their DHCP server could direct your computer to use their DNS server, which might redirect your computer to a malicious site that looks like one of your regularly visited sites (e.g., your bank or e-commerce site). When you enter your login credentials or credit card information into that fake site, the attacker then has your information.
    DNS Spoofing is a topic on the Certified Ethical Hacker (CEH) exam blueprint, but it's also valuable to know for defending your real-world network.
    The defense strategies for a DNS Spoofing attack are similar to those used to defend against a DHCP Spoofing attack, which we demonstrated in a previous video.
    To watch that video, "DHCP Attacks and Defense Strategies," please check out the following link:
    • DHCP Attacks and Defen...
    NOTE: This channel does not endorse or encourage malicious or illegal activity using hacking tools.
    =====================================================
    Don't miss a single one of Kevin's UA-cam videos. Subscribe here:
    ua-cam.com/users/sub...
    =====================================================
    =====================================================
    Kevin Wallace, CCIEx2 #7945 Emeritus (Collaboration and R&S)
    Homepage: kwtrain.com
    Twitter: / kwallaceccie
    Facebook: / kwallaceccie
    UA-cam: / kwallaceccie
    LinkedIn: / kwallaceccie
    =====================================================
    =====================================================
    If you enjoyed this video, here is the video title and also the link for you to share:
    DNS Spoofing Attacks
    • DNS Spoofing Attacks
    =====================================================
  • Наука та технологія

КОМЕНТАРІ • 25

  • @SecurityLessons
    @SecurityLessons 5 місяців тому +1

    It's great, that you say no word about how the attack really works

  • @Whysoserious2-2-2
    @Whysoserious2-2-2 Рік тому +3

    Love the clarity in the way you break things down. I hope your channel grows bigger

  • @andrewchukwudumeje9413
    @andrewchukwudumeje9413 6 місяців тому +1

    Hi thanks for this very educative video
    Much appreciated
    But the attack does not work
    I have two systems which i attempted to use to run this attack
    one runs Kali Linux as the main Operating system (Attacking device)
    And the other one runs Windows 10 as the main OS (Victim device)
    i followed all the steps but the ARP poisoning did not work
    Please how to i resolve this??

  • @leninanciani4375
    @leninanciani4375 Рік тому +3

    Very good video, but I did exactly what you do in this video but Kali didn’t do dns spoofing, when I tried to access the website, the browser keeps thinking or buffering but didn’t send the traffic to my IP, if you know why this happened please let me know, thanks

    • @snipegod5157
      @snipegod5157 Рік тому

      That happens to me as-well I really want to how to fix this issue

  • @ahmedashraf8714
    @ahmedashraf8714 Рік тому +2

    it does not work for me,I did exactly what you did. I have been watching youtube tutorials and nothing works.

  • @simplekindofman8867
    @simplekindofman8867 Рік тому +1

    Just to be clear, you have to be on the same network for this to work?

    • @amirsaifuddinsukri1285
      @amirsaifuddinsukri1285 Рік тому

      yes, because this is a part of man in the middle attack. you attack from inside of the network

  • @Momo-ix5fx
    @Momo-ix5fx 2 місяці тому

    video starts at 3:45

  • @user-fz1du5wt5m
    @user-fz1du5wt5m 3 місяці тому

    perfect job. my apache2 is working only into my virtual machine, how to solve this problem?

    • @user-en4kg8zy4p
      @user-en4kg8zy4p Місяць тому

      bcs in your virtual machin you youe NAT network mode that make you VM machin has her network, to solve it change it to Bridge Adapter from you Virtual machin settings

  • @VoltronLion
    @VoltronLion Місяць тому

    Thank you sir for the videos

  • @awuolantonio5582
    @awuolantonio5582 Рік тому

    It always a pleasure to learn more hope u will continue teaching

  • @user-kq7fx5xx6s
    @user-kq7fx5xx6s 4 місяці тому

    I can’t find ettercap

  • @zyphex1236
    @zyphex1236 Рік тому

    sir , can i follow your network+ videos to learn about networkin ?

    • @kwallaceccie
      @kwallaceccie  Рік тому

      Yes indeed! You can check out all of our video courses (including Network+) by visiting the following link: kwtrain.com/products

  • @tsunningwah3471
    @tsunningwah3471 3 місяці тому

    zhi na

  • @mudasir2168
    @mudasir2168 Рік тому +1

    Awesome !

  • @amarindersandhu4664
    @amarindersandhu4664 Рік тому

    Great Video, thank you!

  • @salomidhogela3979
    @salomidhogela3979 Рік тому

    Great content!

  • @rohanofelvenpower5566
    @rohanofelvenpower5566 Рік тому

    aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa kevin is a vim bro!!!!! I like you more now

  • @futuresystemsbvba
    @futuresystemsbvba Рік тому

    All true but depricated, do ya know the root is gone, as the dns here is forwatd lookups nut once the IP you need to go to that via route-d, since the 13 root servers are only gone, the US has splited the globall INET as APNIC,ARIN,ICANN,IANA,all is replaced by only the ROOT in US, so,
    when the root doesn't has glue Soa and NS values, then the use off BIND is gone, so the tree can manipulate simple the DNS records by setting a TL off 10, once inside that hop you are sizzled inside a sandbox that reroute back and makes a IPINIP PIPE launches a exec DNS over RPC and now the MITM is the man inside the system
    try dig .* ; and then make it with a | , the DNS local returns devices or other stuff on that pipe