Question: Middle attack in your own words. (5 Marks) Q. #2: Go to page 200 of your e-textbook, explain Figure 5-4 in the context of DNS

Middle attack in your own words. (5 Marks) Q. #2: Go to page 200 of your e-textbook", explain Figure 5-4 in the context of DNS poisoning. (5 Marks) WINN D of its records a zone transfer to the valid DNS server, which then accepts them. Any requests to the valid DNS server will now respond with the fraudulent addresses entered by the attacker. 1. What is the address of www.ovil.net? Attacker's computer 2. Please send IP address of www.evil.net 3. Here are all evil addresses Valid DNS www.good.net 192.168.1.1 4. What is the address server www.better.net 192.168.1.1 of www.good, net? www.best.net 192.168.1.1 192.168.1.1 (An attacker's address) Attacker's DNS server ns.evil.net Good user Figure 5-4 DNS server poisoning We've updated our read aloud feature! Give it a try here Privilege Escalation Aa t
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
