{"id":4899,"date":"2019-06-10T16:16:02","date_gmt":"2019-06-10T15:16:02","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4899"},"modified":"2021-04-02T14:38:28","modified_gmt":"2021-04-02T13:38:28","slug":"what-is-dns-poisoning","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning","title":{"rendered":"How to Prevent DNS Poisoning"},"content":{"rendered":"<p>DNS poisoning, also known as DNS spoofing, is one of the most common domain name system (DNS) attacks out there today. The attack is used by hackers looking to infiltrate enterprises of all sizes and gain access to sensitive data, including user login credentials, financial details, and email exchanges. Clearly, it\u2019s crucial that managed services providers (MSPs) understand how this threat typically occurs, and the steps they can take to prevent DNS poisoning. To fully understand how DNS spoofing occurs and ways to protect against it, it\u2019s important to first understand DNS as a whole.<\/p>\n<h3><b>What is DNS?<\/b><\/h3>\n<p>The domain name system, or\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/secure-dns-servers\">DNS<\/a>, is a hierarchical naming system for computers, services, and other internet resources. Essentially, it\u2019s the phonebook of the internet. For every domain name there\u2019s a corresponding set of 10 or so numbers that comprise the domain name\u2019s IP address. Straightforward, reader-friendly domain names were created so users wouldn\u2019t have to remember complicated IP addresses for every website they visit. It is the responsibility of the DNS to pair domain names with internet IP addresses so users can access websites. Here\u2019s how the process works:<\/p>\n<ol>\n<li>Every time you enter a domain name, your browser will first search its own domain to see if the website you are searching for is hard-coded into its system. For example, if you work for Google, gmail.com would already be coded into your system. This would make your system the authoritative name server for that particular address. More often than not, you are searching for IP addresses outside of your domain.<\/li>\n<li>Next the DNS resolver will check its own cache of IP addresses for a match. Think of the cache as a historical database of previously searched domain names and IP addresses. Cached addresses typically have a limited lifespan of a few hours. This is called a time to live, or TTL.<\/li>\n<li>When no address is found in the cache, the DNS resolver queries other DNS servers to see if they can identify the correct IP address or locate the authoritative name server for that particular domain. Communication between DNS servers is constant and results in the quick identification of IP addresses, allowing users to navigate the web with little interruption.<\/li>\n<\/ol>\n<h3><b>What is a DNS poisoning attack?<\/b><\/h3>\n<p>A DNS poisoning attack, also known as a DNS spoofing attack, is when attackers infiltrate the DNS query process to redirect users to fake websites. These fake websites are run by the attacker and can often look remarkably like the real thing, luring unsuspecting users to enter highly sensitive data, like credit card numbers and login credentials, or inadvertently download viruses and other\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-to-remove-malware\">forms of malware<\/a>.<\/p>\n<p>This type of attack is considered a DNS cache poisoning because the illegitimate IP address lives in the cache of the server. Attackers can even manipulate the TTL so that their fake websites live in the cache beyond the typical cache lifespan of a few hours. The risk involved with cache poisoning goes beyond the DNS server that was originally infected. Any DNS server that queries the infected server and receives the imitation IP address for a specific website is at risk.<\/p>\n<p>For example, if a DNS server starts unknowingly directing its customers to a fake banking website using a scam IP address it picked up, other DNS servers who pick up the IP address of the bank from the poisoned DNS server will also receive the corrupted address, thus exposing their customers to the attackers.<\/p>\n<h3><b>Can DNS be hacked?<\/b><\/h3>\n<p>Your DNS server is considered hacked when an attacker has found their way into your router and gained control of your DNS settings. This is known as a form of man-in-the-middle attack and can happen if a user unknowingly downloads malware.<\/p>\n<p>A hacker with control of your DNS settings is able to manipulate your system so that, instead of querying secure DNS servers, it queries the hacker\u2019s server and leads you to a host of imitation sites. Similar to DNS poisoning, this can lead users to unwittingly put their banking details or login and password credentials in the hands of attackers.<\/p>\n<p>A hacker with control of your DNS settings also has the ability to redirect users to fake sites that convince the user they have downloaded a virus, even if they actually haven\u2019t, and trick them into buying the hacker\u2019s software to remove it. The scariest part about all of this? By the time a user realizes their DNS server has been compromised by an attacker, it\u2019s often too late.<\/p>\n<h3><b>How does a DNS attack work?<\/b><\/h3>\n<p>Attackers prey on\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/troubleshooting-dns-issues\">DNS vulnerabilities<\/a>\u00a0and take advantage of the constant communication between DNS servers to execute an attack. The goal of a DNS attack is to direct users to an IP address of the hacker\u2019s choosing. Sometimes it\u2019s to an imitation website, as is the case of DNS spoofing. Other times it\u2019s to a targeted website that the attacker knows is unprepared to handle a large, sudden increase in traffic. This unexpected onslaught of visitors causes the targeted website to crash\u2014a form of a distributed denial of service (DDoS) attack.<\/p>\n<p>There are a number of ways an attacker can find their way into your DNS system, including:<\/p>\n<ul>\n<li><b>Forged Responses:\u00a0<\/b>Attackers will often develop imposter DNS servers that attempt to submit the IP address of a fake website in response to a query before a legitimate DNS server has the opportunity to do so. If their address is accepted first, the user is then led to the hacker\u2019s server and imitation websites.<\/li>\n<li><b>Weak Passwords:\u00a0<\/b>A U.K. study of 2,205 people found that a shocking 82% had never changed the default password on their\u00a0<a class=\"ext\" href=\"https:\/\/www.broadbandgenie.co.uk\/blog\/20180409-wifi-router-security-survey\" target=\"_blank\" rel=\"noopener noreferrer\">wireless router<\/a>. The use of default password, or passwords with little-to-no variation, including numbers, unique characters, and letters, provide attackers the opportunity to easily crack into a router and gain access to the DNS server.<\/li>\n<li><b>Spam Emails:\u00a0<\/b>Attackers will send spam emails laden with fear-inducing language designed to manipulate users into clicking on certain URLs. When these infected URLs are clicked it allows the hacker to infect the system with a code that sends the DNS server to untrustworthy websites.<\/li>\n<li><b>Banner Ads and Images:\u00a0<\/b>Just like in spam emails, an attacker can use fake banner ads and images on websites to trick users into clicking on them, thus opening the door for DNS poisoning to occur.<\/li>\n<\/ul>\n<h3><b>Protecting against a DNS attack<\/b><\/h3>\n<p>There are a number of DNS security best practices out there to help you ward off attackers and keep your customers\u2019 systems safe and secure. Since DNS servers are in constant communication with one another, the more companies that implement these best practices, the greater protection there is as a whole. Here are the most important steps you should be taking to prevent DNS poisoning:<\/p>\n<ul>\n<li><b>Security Extensions:\u00a0<\/b>The Internet Engineering Task Force (IETF) developed DNS Security Extensions (DNSSEC) to address security threats against DNS. This is widely considered one of the greatest measures of defense out there. DNSSEC relies on digital signatures and complex encryption methods to verify the validity and authenticity of a DNS request.<\/li>\n<li><b>Active Monitoring:<\/b>\u00a0It\u2019s important to monitor DNS data and keep an eye out for new patterns, like the appearance of a new external host, that could indicate the presence of an attacker.<\/li>\n<li><b>Patches:\u00a0<\/b>DNS servers are subject to vulnerabilities. Staying on top of the latest patches can safeguard against attackers looking to exploit these well-known vulnerabilities.<\/li>\n<li><b>DNS Updates:\u00a0<\/b>Updated versions of DNS come equipped with port randomization and cryptographically secure transaction IDs to help prevent against DNS attackers. Always make sure the server you are using is up to date.<\/li>\n<li><b>Password Policies:<\/b>\u00a0Convincing your customers to implement password protection policies is of utmost importance. A weak router password could put every device and user within their company in jeopardy.<\/li>\n<li><b>HTTPS Indicators:\u00a0<\/b>The HTTPS indicator should be in the browser address bar at all times. This lets you know that the site is valid. If the appearance of the HTTPS indicator is in flux, it could signal the beginning of an attack.<\/li>\n<\/ul>\n<p>DNS poisoning, man-in-the-middle schemes, and DDoS tactics are just a few of the many DNS attacks out there. It\u2019s important to stay on top of these cybersecurity threats\u00a0and the latest risk-mitigation techniques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS poisoning, also known as DNS spoofing, is one of the most common domain name system (DNS) attacks out there today. The attack is used by hackers looking to infiltrate&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4899","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Spoofing &amp; Poisoning Prevention Tactics - N-able<\/title>\n<meta name=\"description\" content=\"Read about DNS spoofing and poisoning attacks so that potential DNS server vulnerabilities are never exploited.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Spoofing &amp; Poisoning Prevention Tactics - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about DNS spoofing and poisoning attacks so that potential DNS server vulnerabilities are never exploited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-10T15:16:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-02T13:38:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How to Prevent DNS Poisoning\",\"datePublished\":\"2019-06-10T16:16:02+01:00\",\"dateModified\":\"2021-04-02T13:38:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning\"},\"wordCount\":1393,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning\",\"name\":\"DNS Spoofing & Poisoning Prevention Tactics - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2019-06-10T16:16:02+01:00\",\"dateModified\":\"2021-04-02T13:38:28+00:00\",\"description\":\"Read about DNS spoofing and poisoning attacks so that potential DNS server vulnerabilities are never exploited.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent DNS Poisoning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Spoofing & Poisoning Prevention Tactics - N-able","description":"Read about DNS spoofing and poisoning attacks so that potential DNS server vulnerabilities are never exploited.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning","og_locale":"fr_FR","og_type":"article","og_title":"DNS Spoofing & Poisoning Prevention Tactics - N-able","og_description":"Read about DNS spoofing and poisoning attacks so that potential DNS server vulnerabilities are never exploited.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-06-10T15:16:02+00:00","article_modified_time":"2021-04-02T13:38:28+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How to Prevent DNS Poisoning","datePublished":"2019-06-10T16:16:02+01:00","dateModified":"2021-04-02T13:38:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning"},"wordCount":1393,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning","url":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning","name":"DNS Spoofing & Poisoning Prevention Tactics - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2019-06-10T16:16:02+01:00","dateModified":"2021-04-02T13:38:28+00:00","description":"Read about DNS spoofing and poisoning attacks so that potential DNS server vulnerabilities are never exploited.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-dns-poisoning#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"How to Prevent DNS Poisoning"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/4899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=4899"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/4899\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=4899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}