logo

ICT Ethical Hacking: DNS and DHCP Attacks and Prevention

Build three Virtual Machines (VM) including a Linux Server, DNS, and an additional service of your choice for a practical assignment on understanding countermeasures to protect vulnerable infrastructure.

33 Pages3485 Words255 Views
   

Added on  2023-06-12

About This Document

This article covers the basics of DNS and DHCP in ICT Ethical Hacking. It explains DNS Raid, DNS Transmission, and types of DNS attacks such as DNS Spoofing and DDOS. It also covers DHCP snooping concepts and types of snooping. The article provides step-by-step procedures for DNS spoofing and DHCP snooping and prevention methods for both attacks.

ICT Ethical Hacking: DNS and DHCP Attacks and Prevention

Build three Virtual Machines (VM) including a Linux Server, DNS, and an additional service of your choice for a practical assignment on understanding countermeasures to protect vulnerable infrastructure.

   Added on 2023-06-12

ShareRelated Documents
ICT Ethical hacking
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_1
Table of Contents
1 Introduction.......................................................................................................................................2
2 Domain Name System........................................................................................................................2
2.1 DNS Raid....................................................................................................................................3
2.2 In what way DNS Transmission works....................................................................................3
2.3 Types of DNS attack..................................................................................................................3
2.3.1 DNS Spoofing.....................................................................................................................3
2.3.2 DDOS................................................................................................................................10
3 DHCP................................................................................................................................................15
3.1 Definition..................................................................................................................................15
3.2 How DHCP works....................................................................................................................15
3.3 DHCP snooping concepts........................................................................................................16
3.4 Types of snooping....................................................................................................................16
3.4.1 DHCP Snooping...............................................................................................................17
3.4.2 DNS starvation attack......................................................................................................19
4 Installation steps for Kali Linux.....................................................................................................25
5 Conclusion........................................................................................................................................31
6 References........................................................................................................................................31
1
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_2
1 Introduction
Information and communication technology is to enlarge coaching and training environments. It
permits self-training with the help of different tools like tasks. As an effect of coaching and
training, it develop into more beneficial and worthful. In this Ethical hacking, Domain Name
System will be studied. After explained that, DNS attack and its types will be revised. Then DNS
snooping will be analyzed. After that step by step procedure will be explained. And finally
prevention of DNS snooping will be explained. Dynamic Host Configuration Protocol (DHCP)
will be revised. After explaining that, Types and Step by step procedure will be analyzed. And
finally Prevention of DHCP snooping configuration will be explained.
2 Domain Name System
DNS is Domain Name System. It is used for change the domain name into their respective IP
address in TCP/IP protocols. DNS have a network protocol for memorizing host name and
address through a distributed data base. The domain name system directing the user to locate a
website with the conversion of domain name into IP address. The DNS is used for translating
human format name of site into the IP address (Zheng, 2014).
2
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_3
2.1 DNS Raid
DNS Raid is also known as attacks on DNS. In DNS raid the attacker can change the IP address.
If the user can access that webpage, the attacker can get the information about the user. The wide
usage of internet is the main reason for DNS attack. Now a days, DNS attacks are very common.
The DNS attack is some hacker change the IP address of a website. When a user access the
website automatically the hacker can get the details of a user (Lee, Baek & Kim, 2015).
2.2 In what way DNS Transmission works
The goal of DNS server is converting or changing the domain name into the respective IP
address. It works like a mapping. When a server gets the IP address all information will start
relocating from website server to client and client to website server.
2.3 Types of DNS attack
The different categories of DNS attacks are given below.
DNS spoofing
DNS Amplification
DNS Tunneling
2.3.1 DNS Spoofing
DNS spoofing is a type of DNS attack. In this attack the hacker can change the fake website to
look like an original real website. The hacker done with the diverting traffic of the users.
Spoofing attacks can go for long time period without being detected and sometimes it may cause
serious issues. DNS spoofing is also called as DNS hijacking (Zhang & Xia, 2013) (Sridevi &
Dr.Manjaiah D.H, 2012).
3
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_4
DNS spoofing is the changing of IP address from one to another address. The attacker can
redirect all DNS requests to attacker's/ Hacker's machine or computer. It is one of the way of
stealing the information from the user. It is one of the deadly attack. It is very hard to identify
whether the information are stealing or not.
2.3.1.1 Step by step procedure of DNS spoofing
Step 1: start Kali
Click on applications. There will show lot of option in list view and choose kali Linux. After
choosing kali Linux select Sniffing. After selecting that sniffing you have to choose Network
sniffers. At last select dnsspoff.
4
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_5
Step 2: Access dnsspoof
After clicking dnsspoof, the upcoming terminal will appears automatically. The syntax is shown
in below figure.
Step 3: Composition for Sniffing
In windows 7 system bankofamerica.com webpage is redirect into our webpage. Here we can use
browsers like Google chrome, opera etc.
5
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_6
Step 4: Flush the DNS storehouse
The first step is DNS storehouse flushing in window 7. By this method, the client can't use the
DNS storehouse on his or her system. But in reality, this step is no need.
Terminate the browser after that type the following things:
ipconfig
The first step is make the network card on kali Linux server for accepting all packets.
ifconfig etho promisc
Then we terminate the transmission between webpage of bankof america and web server of
windows 7.
tcpkill -9 host [www.bankamerica.com]
After terminating the webpage of bankofamerica, conclude the tcpkill with the help of ctrl + c.
Step 5: creating a list of Host
The Linux on client DNS shows that the host list is acting as a fixed DNS. With the help of host
list or file we can redirect the webpage of bankofamerica instead of our webpage.
cd /usr/local
With the help of text editor we can open list of host. Here we are using Back Track methods so
kali don't have a write on it. But the kali contain graphical VIM. Graphical VIM named as gvim.
6
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_7
Hosting the gvim
We have the list of host, so we want to include the upcoming line to it. We change an IP address
and map that IP address to webpage of bankofamerica.
192.168.1.101
The TAB key is used to domain from IP address and to IP address from domain. No spaces are
allowed sometimes it may interpret by domain name's part.
Step 6: BOA webpage creating
In this step, we are going to create a webpage named as BOA.
ifconfig eth0 -promisc
In this step we need to generate a webpage, which is redirected to the Webpage of BOA. We can
create a simple webpage instead of bankofamerica.
Open index.html.
The index page will displayed in the below figure and the coding is also displayed.
7
ICT Ethical Hacking: DNS and DHCP Attacks and Prevention_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network security and Protocols Assignment
|26
|4317
|64

System Management Assignment | Local Area Network (LAN)
|21
|2615
|254

Classification of Network Protocols
|6
|2727
|25

Designing and Configuring the Local Area Network
|16
|2307
|52

Networking Technologies Assignment
|9
|2023
|44

Support For Multiple Windows Servers Domains In A Local Area Networks
|18
|2298
|150