研究的这几天,逐渐发现。如今,有些攻击名字变了,攻击手段不适用了。所以记清每一种不那么必要,见招拆招更有效。理论搞熟,再熟悉几个法则,ok了。
主要分为针对服务器和针对客户端
DNS cache poisoning relates to an attack consisting of making a DNS server cache false information: usually, a wrong record that will map a name to a “wrong” IP address. We will see that there are different ways for a hacker to do that, and that they are often related to DNS spoofing. With DNS cache poisoning, the hacker will try to make a DNS answer something he wants for a specific request. For instance, try to make the ns.defense.gov DNS to answer with the IP of the hacker’s computer to any query about the IP of telnetaccess.defense.gov.
DNS spoofing:DNS欺骗,是一个术语,专指伪造DNS响应欺骗客户端或者服务器。对应着两种攻击方向--客户端的ID Spoofing和服务器的Spoofing。可以参看http://hi.baidu.com/hacknone/blog/item/2aff9d5b7f0fd3262934f063.html 。 但是这种对付服务器的spoofing已经是老套的攻击方式了,现在由于存在bailiwick check(This just means that any records that aren't in the same domain of the question are ignored),所以已经失效了。
Kaminsky attack:只需要一台PC,边发请求,边发响应碰撞,响应包中包含同域名(为了bailiwick check)的auth信息和addition信息(错误的A地址)。如果碰撞成功,则更新server的记录。