InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

Member-only story

Advanced DNS Attacks: Poisoning and Exploitation

Karthikeyan Nagaraj
InfoSec Write-ups
Published in
4 min readJan 11, 2025

The Domain Name System (DNS) is often called the “phonebook of the internet,” translating human-readable domain names (e.g., example.com) into machine-readable IP addresses. While essential, DNS is inherently vulnerable to several attacks, with DNS poisoning being one of the most critical.

In this article, we’ll explore the mechanics of DNS poisoning, practical exploitation techniques, and strategies to secure DNS infrastructure.

1. What is DNS Poisoning?

DNS poisoning (also called DNS cache poisoning) involves injecting false DNS records into a DNS resolver’s cache. This misdirects users to malicious websites or intercepts network traffic, enabling phishing, malware distribution, and data theft.

How It Works:

  1. An attacker sends forged DNS responses to a resolver.
  2. The resolver caches the malicious response.
  3. Future queries for the poisoned domain are directed to the attacker-controlled IP.

2. Common DNS Attacks

2.1 DNS Cache Poisoning

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Karthikeyan Nagaraj

Entrepreneur | Writer | Cyber Security Consultant | AI Researcher TopMate - https://topmate.io/cyberw1ng

Write a response

well done .

--