DNS Spoofing Attacks

Описание к видео DNS Spoofing Attacks

Download Our CCNA (200-301) Practice Exam for FREE
https://kwtrain.com/ccna-prep
***********************************

In this video, you'll see how an attacker might launch a DNS Spoofing attack against your network, and we'll discuss how to defend yourself. For example, an attacker might launch a DHCP Spoofing attack, convincing your computer to use the attacker's DHCP server. Their DHCP server could direct your computer to use their DNS server, which might redirect your computer to a malicious site that looks like one of your regularly visited sites (e.g., your bank or e-commerce site). When you enter your login credentials or credit card information into that fake site, the attacker then has your information.

DNS Spoofing is a topic on the Certified Ethical Hacker (CEH) exam blueprint, but it's also valuable to know for defending your real-world network.

The defense strategies for a DNS Spoofing attack are similar to those used to defend against a DHCP Spoofing attack, which we demonstrated in a previous video.

To watch that video, "DHCP Attacks and Defense Strategies," please check out the following link:

   • DHCP Attacks and Defense Strategies  

NOTE: This channel does not endorse or encourage malicious or illegal activity using hacking tools.

=====================================================
Don't miss a single one of Kevin's YouTube videos. Subscribe here:
http://youtube.com/subscription_cente...
=====================================================

=====================================================
Kevin Wallace, CCIEx2 #7945 Emeritus (Collaboration and R&S)
Homepage: http://kwtrain.com
Twitter:   / kwallaceccie  
Facebook:   / kwallaceccie  
YouTube:    / kwallaceccie  
LinkedIn:   / kwallaceccie  
=====================================================

=====================================================
If you enjoyed this video, here is the video title and also the link for you to share:
DNS Spoofing Attacks
   • DNS Spoofing Attacks  
=====================================================

Комментарии

Информация по комментариям в разработке