Hello guys welcome to Technorelate blog, today you will learn about DNS Spoofing. What is DNS Spoofing ? And how does it work? What is the basic relationship with Ethical Hacking or Black Hat Hacking?
What Is DNS [Domain Name System]
The full name of the DNS is the Domain Name System. As we open a website in the browser such as Google.com, but Internet servers do not understand all of these, they consider it as an Internet protocol. All websites have their own identity which are identified by Internet Protocol. When someone is searched Google.com in a browser, then the domain name system gives the IP address to User in numbering then you will be connect with Google, but you can’t see this IP address directly.
Also Read: How To Hack Any Simcard With A Message
If a hacker spoof your IP address, then hacker can send any quarry from your IP address by his computer but you will surf on these quarry. You want to open another website but if the hacker is opening another website then the same website will open in your computer which is opening hacker.
Hacker can do DOS Attack on your computer. In this case you will show Unable Response or Any Types of error on your computer. Your Browser will be crash at this movement, hacker can send multiple quarry from your IP address and after that many more pop-up will open on your browser at same time.
What Is Amplification ?
When hacker open different websites on different devices with your IP address and redirect all websites to your device, when DNS system reply of all quarry to your IP address then your browser can’t handle all different websites at same time then your Internet system and Browser will be completely crash.
What Kind Of Risk In DNS Spoofing ?
DNS Spoofing poses several risks, starting with data theft. Banking websites and popular online retailers are easily spoofed, meaning any password, credit card or personal information may be compromised. Also, if spoofed sites include Internet security providers, a user’s computer may be exposed to additional threats such as viruses or Trojans, because legitimate security updates will not be performed.
That’s it guys, you’re done all steps. Now enjoy with this tutorial. Dear visitors if you like my this Article then Please Share this post with your friends & family. Also drop your comments if this helpful for you or have you any types of quarry.