a phishing attack poisons a domain name on a domain name server

DNS is the Domain Name Server. That much essential for any device to connect with the server. Any device might be mobile and PC (Personal Computer).

Domain Name Server is much needed to establish the connection between client and server. We can say that DNS is much important to establish the connection between the client to the server. We already said about Domain Name Server in the previous blog. you can see more Phishing attacks on Domain Name Server.

Domain Name Server (DNS))

We said in this blog How Attackers can be theft the information when the DNS is failed or we are reached to DNS failed website. As beginners, it is very difficult to identify how we safe on the internet. But, I will share my knowledge with you. Therefore You can know. So, let be stay with me.

We can identify the location by DNS (Domain Name Server). From where we are accessing the network. That is the Internet Service Provider Location. Not our location. But, Attackers can be reached to our location. If they are accessible to connect our network service provider’s location.

Domain Name Server has consisted of many Such as Root Domain, Sub Root Domain, Second Sub Root Domain, etc.

The most common types of records stored in Domain Name Server databases like A, AAAA (IP Address), MX (Mail Exchanger), FTP (File Transfer Protocol), NS (Name Server), CNAME (Domain Name Aliases). Most of these database file saved in the zone file.

Domain Name Server is memorized the Domain Name to specific numeric IP address (Internet Protocol is in numeric format like 123.456.789.741

We can communicate with the other devices By IP Address. That has unique for each one. Three main DNS records loading the web pages.

Phishing attack mostly happens while DNS failed. The Attacks can be accessed server by using malicious codes. Attackers can be try to theft the username and password by this technique.

Domain Name Server Recursor

DNS recursor loads the client queries through web browsers like Google Chrome, Mozilla Firefox, Internet Explorer, etc. That is the beginning process of the Domain Name Server. That can send multiple queries through the web browser.

Root Name Server: the root name server where all domains are located. That specifies the location of the domain name.

TLD Name Server (Top Level Domain Name Server): TLD Name Server is a domain name server like  .com, .in,  .us,  .uk. that is involved countries’ specific name servers. And some time business owner creates the nameserver.

Authoritative Name Server: that is the authorized server. that response back to the domain name server recursor. That is the end of the process of DNS queries. That looks like example.com, google.com.

The domain name server recursor don’t need the same request multiple time. caching is responsible send the request through the web browser.

Conclusion:

It’s very essential to all internet users how the browser sends a request to the server. that is an interesting topic for all of us. The client request a web browser. The web browser sends the request to an authoritative web server. After the web server response back to the web browser. After the client gets the request of the web server through the web browser.

Sometimes it gets an error if the request or response time has too long. The browse sends the request directly to the client that request time is too long.

But, sometimes it can be dangerous while the domain name server is failed. The attackers can be an advantage of this. That can be redirected to the client request to the malicious web server. And theft the information of us.

So, we should be avoided that web page or web server that shows the Domain Name Server failed error. we can check up the domain name server in who lookup. Where established the name server of the domain.

Share This Article

Leave a Comment