目录
一、实验概述
DNS (Domain Name System) is the Internet’s phone book; it translates hostnames to IP addresses (and vice versa). This translation is through DNS resolution, which happens behind the scene. DNS attacks manipulate this resolution process in various ways, with an intent to misdirect users to alternative destinations, which are often malicious. The objective of this lab is to understand how such attacks work. Students will fifirst set up and confifigure a DNS server, and then they will try various DNS attacks on the target that is also within the lab environment.
The diffificulties of attacking local victims versus remote DNS servers are quite different.Therefore, we have developed two labs, one focusing on local DNS attacks, and the other on remote DNS attack. This lab focuses on local attacks. This lab covers the following topics:
• DNS and how it works
• DNS server setup
• DNS cache poisoning attack
• Spoofifing DNS responses
• Packet sniffifing and spoofifing
• The Scapy tool
二、实验环境
2.1 测试 DNS 设置
$ dig ns.attacker32.com
将查询发送到我们的本地 DNS 服务器,该服务器会将查询
发送到 example.com 的官方名称服务器。
$ dig www.example.com
将查询直接发送到 ns.attacker32.com
$ dig @ns.attacker32.com www.example.com
三、实验内容
-
域名解析 Answers 毒化
实验步骤 :