How it typically works?
- Cache poisoning: attacker floods a DNS resolver with forged responses until it accepts a malicious record.
- Redirection: user requests are resolved to the attacker’s IP instead of the legitimate server.
- Exploitation: attacker collects sensitive information or distributes malware from the fake site.
Common techniques & variants
- DNS cache poisoning: corrupting local or ISP DNS cache with false records.
- Pharming: redirecting users to fraudulent websites without modifying hosts file.
- MITM DNS interception: attacker relays and alters DNS queries in real time.
Impact
DNS spoofing can lead to large-scale credential theft, malware distribution, and fraud. Because it can target multiple users simultaneously through poisoned caches, the scope of impact is often broader than individual MITM attacks.
Further reading
- Cloudflare: What is DNS spoofing? Read more
- OWASP: DNS Spoofing. Read more
- Kaspersky: DNS Spoofing and Cache Poisoning. Read more