DNS SPOOFING
DNS spoofing is a malicious computer attack that redirects users to fake websites to steal data. Learn about the risks, recent attacks, and preventive measures to secure your online activities.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
TEAM Diksha Gupta (Team Lead) Rishabh Bundela (Member) Avneet Bhatia (Member) Pre-final year students pursuing bachelor of engineering in computer science branch from Chandigarh University.
CONTENTS Problem Description Reason for Choosing Solution
WHAT IS DNS SPOOFING? DNS Spoofing is a type of computer attack wherein a user is forced to navigate to a fake website disguised to look like a real one, with the intention of diverting traffic or stealing credentials of the users.
DNS SPOOFING EXAMPLE
WHY DNS SPOOFING? To secure user data As most easy way to breach data is using DNS cache poisoning. Become important in the upcoming years due to upcoming cyber war.
PREVIOUS ATTACKS A major DNS cache poisoning attack compromised Amazon s DNS servers, redirecting users to malicious web sites Facebook suffered from DNS spoofing attack. Dec. 2019 Apr. 2018 2020 Hackers redirected traffic from Twitter to their own web site.
THE SOLUTION
GCIH Practical Assignment version 2.1 DNS Spoofing Attack Support of the Cyber Defense Initiative by Amal Al. Hajari 1. Available at: https://www.giac.org/paper/gcih/364/dns-spoofing-attack/103863 Review Paper on prevention of DNS spoofing by Roopam, Bandana Sharma 2. Available at: https://www.ijemr.net/DOC/PreventationOfDNSSpoofng(164-170)b532c722-1c88- 4d9c-9857-3647dae8f688.pdf A comprehensive analysis of spoofing by P. Ramesh Babu, D. Lalita Bhaskar, CH. Satyanarayan 3. Available at: https://www.researchgate.net/publication/49597043_A_Comprehensive_Analysis_of_Spoofing REFERENCES How to prevent DNS poisoning and spoofing by Jeff Thompson. 4. Available at: https://cybersecurity.att.com/blogs/security-essentials/dns-poisoning Blog post on What is DNS Cache Poisoning and DNS Spoofing? 5. Available at: https://www.kaspersky.co.in/resource-center/definitions/dns Blog Post on how to prevent DNS poisoning 6. Available at: https://www.n-able.com/blog/what-is-dns-poisoning https://www.cloudflare.com/dns/dnssec/how-dnssec-works/ 7. 8. Blog Post on What is DNS Poisoning and How to Prevent it. Available at: https://bluecatnetworks.com/blog/what-is-dns-poisoning-how-to-prevent-it/
THANK YOU 19BCS1557@GMAIL.COM 19BCS1146@GMAIL.COM 19BCS1347@GMAIL.COM