CAPEC-598

DNS Spoofing
Draft
2017-01-04
00h00 +00:00
2023-01-24
00h00 +00:00
Alerte pour un CAPEC
Restez informé de toutes modifications pour un CAPEC spécifique.
Gestion des notifications

Descriptions du CAPEC

An adversary sends a malicious ("NXDOMAIN" ("No such domain") code, or DNS A record) response to a target's route request before a legitimate resolver can. This technique requires an On-path or In-path device that can monitor and respond to the target's DNS requests. This attack differs from BGP Tampering in that it directly responds to requests made by the target instead of polluting the routing the target's infrastructure uses.

Informations du CAPEC

Conditions préalables

On/In Path Device

Compétences requises

To distribute email

Atténuations

Design: Avoid dependence on DNS
Design: Include "hosts file"/IP address in the application
Implementation: Utilize a .onion domain with Tor support
Implementation: DNSSEC
Implementation: DNS-hold-open

Références

REF-477

Inferring Mechanics of Web Censorship Around the World
John-Paul Verkamp, Minaxi Gupta.

REF-479

Towards a Comprehensive Picture of the Great Firewall's DNS Censorship
Anonymous.

Soumission

Nom Organisation Date Date de publication
Seamus Tuohy 2017-01-04 +00:00

Modifications

Nom Organisation Date Commentaire
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Attack_Patterns
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Related_Attack_Patterns
CAPEC Content Team The MITRE Corporation 2023-01-24 +00:00 Updated Description