Learn about DNS Hijacking and how to prevent it!
In technology, the term DNS - short for Domain Name Resolution is used to refer to address resolution, or in short, to solve the problem, to navigate the URL when you enter the address into the Address bar on the browser. . Easier to understand, DNS makes it easy and quick to access the IP address of the website you want to visit.
Besides, DNS Cache - or DNS caching, refers to DNS information on the local computer, which contains the resolved IP address of the websites you visit frequently (similar to Browser cookies like that). The idea of DNS Cache is to help users save time when accessing websites regularly, but this is a good bait for hackers when the DNS Cache contains personal information of users. And the most common hacker job in this case is to attack, take ownership of DNS Cache, change the user's IP address to another fake website address.
1. What is DNS Hijacking?
DNS Hijacking is a form of redirecting website addresses that users access. Understandably, you type abc.com into your browser, but in fact you are "being" navigated to another address, for example xyz.com .
You can see that most domains - Domains of web pages are placed as text (eg, quantrimang.com ), with each URL having an IP address corresponding to that URL, and the task The main part of DNS is to resolve, convert text characters ( quantrimang.com ) into the corresponding IP (you open RUN command> type " ping " to the domain that will output the IP address of that website). Specific examples:
What is the most common way of hackers in this case? They will entice users to install a certain piece of malware on the computer, usually Malware, and this malware will have the main task of changing the DNS of the computer system. Every time a user enters the address of any website, the system will automatically connect to the hacker's fake DNS server (instead of the DNS actually used by ICANN - The Internet Corporation for Assigned Names and Numbers ) and Navigate users to fake hacker websites.
See more:
- What is PROXY?
- What is SOCKS?
2. DNS Hijacking and DNS Cache Poisoning:
Both of these attack methods happen locally - that is, the user's computer. They are assigned very specifically:
- DNS Hijacking : the task of installing malware on a user's computer.
- DNS Cache Poisoning (or also called Spoofing ): hijack DNS Cache and change the value and information in it to fake information.
For example, when you type the quantrimang.com address into the address bar of the browser, the system will confirm the IP address information corresponding to the domain name quantrimang.com and return the information to the computer (the result is the quantrimang.com website fully displayed on the browser). A domain name may contain multiple IP addresses, and when you visit quantrimang.com regularly, the system will recognize this as a website to remember, to shorten the time for subsequent visits.
Besides, this difference is exploited by hackers quite thoroughly (of course they have prepared many fake DNS servers), and among many fake DNS addresses there will be 1/10 success rate , and take precedence over the ISP's genuine DNS (the hacker proceeds to send the signal continuously). This is the way DNS Cache Poisoning works .
And because of the way it works, DNS Hijacking and DNS Cache Poisoning are used interchangeably.
3. How to prevent DNS Hijacking?
The best method is still:
- Use a good and reasonable security software.
For simple users, Avira Free Antivirus is a great choice. Download the latest free Avira link:
- Download Avira Free Antivirus
In the browser, restrict click on advertisements, especially when looking for crack software (a lot of malware comes):
- How to block ads when using a browser
Try changing the DNS on your computer to Google's DNS ranges, Open DNS or Comodo DNS:
- Google DNS: 8.8.8.8 - 4.4.8.8
- Open DNS: 208.67.222.222 - 208.67.220.220
- Comodo DNS: 8.26.56.26 - 8.20.247.20
Good luck!
You should read it
- Learn about Man-in-the-Middle attacks - ARP Cache spoofing
- Learn about Man-in-the-Middle attacks - Obtain SSL control
- Learn about attacking Man in the Middle - Taking over Session control
- How does CPU Cache work? What is L1, L2 and L3 Cache?
- Learn how Cache works (Part 3)
- Learn how Cache works (Part 2)
- Learn how cache works
- How to clear the DNS cache buffer in Google Chrome
May be interested
- Android malware believed to be spreading from Vietnam has attacked more than 10,000 Facebook accounts in 140 countriessecurity firm zimperium has discovered a malicious campaign spreading through social media hijacking, third-party app stores, and externally installed apps.
- Understanding Clickjacking: The Browser-Based Attack That Can Bypass Protections to Take Over Accountsclickjacking tricks unsuspecting people into clicking on links they think are harmless — but then downloads malware, harvests login credentials, and takes over online accounts.
- Three critical holes in Linksys routers, hackers can take advantage of hijackinglinksys e series routers can get three vulnerabilities that help hackers gain control.
- How to Prevent Unauthorized Access to Fileswhen you share a computer with family members or coworkers, you may need to learn how to prevent unauthorized access to files. this way you can keep your work or personal files safe from being accidentally viewed, changed, or deleted. if...
- What is DNS and DNS Lookup?what is dns? what role does it play and why should you care about it? besides dns there are many additional concepts, one of which is dns lookup. and in this article we will learn about both dns and dns lookup.
- How to prevent students from drawing on Zoomwhen teachers share screens in zoom, they will encounter cases where students draw and write on zoom. so how to prevent students from drawing on zoom?
- More than 4,000 Office 365 accounts are affected by account hijacking attacksrecently launched account takeover (ato) attacks are thought to have affected about 4,000 office 365 accounts. most of these accounts were hijacked and then used. used to perform many different malicious activities.
- How to prevent iPad from going to sleepif you have an old ipad, there are lots of great ways to use it, but the auto-sleep feature can be frustrating.
- How to prevent Windows from saving files to OneDriveonedrive is a powerful cloud storage app that comes pre-installed on both windows 10 and windows 11 computers. with onedrive, you can easily store your data in the cloud and share files across multiple devices.
- How to prevent common summer pests from entering your homeplan ahead for summer pest control so you can prevent insects from becoming a nuisance.