DNS spoofing Archives | Vednam https://vednam.com/tag/dns-spoofing/ Latest News on Cyber Security,Hacking and Tech Tue, 16 Jun 2020 14:13:36 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://vednam.com/wp-content/uploads/2020/05/cropped-LOGO-PNG-02-1-32x32.png DNS spoofing Archives | Vednam https://vednam.com/tag/dns-spoofing/ 32 32 What is Social Engineering ? How thing work inside ? https://vednam.com/what-is-social-engineering-how-thing-work-inside/ https://vednam.com/what-is-social-engineering-how-thing-work-inside/#respond Tue, 16 Jun 2020 12:16:47 +0000 https://vednam.com/?p=904 Social Engineering is the technique performed by the threat actors who have the intention to exploit human weakness. The involvement of various techniques which involve the manipulation of human psychology. The Threat actor especially used the social engineering methods to gain sensitive information from the victims. The Social Engineering attacks always depend on the trust […]

The post What is Social Engineering ? How thing work inside ? appeared first on Vednam.

]]>
Social Engineering is the technique performed by the threat actors who have the intention to exploit human weakness. The involvement of various techniques which involve the manipulation of human psychology.

The Threat actor especially used the social engineering methods to gain sensitive information from the victims. The Social Engineering attacks always depend on the trust factor which can gain from the victim’s side which can never suspect in giving out his/her personal information such as phone numbers, passwords, social security numbers, etc.

This method and technique have always proved to be effective when it comes to compromising the entire network of an organization. The cyber threat actor can disguise himself as the IT audit team member or an external network administrator and that can easily obtain the access inside the building without any suspicious.

When they get access to the entire organization then it follows various and other social engineering techniques to compromise the whole network.

If an organization is under threat of attack that means the whole organization has no good facility of IT security administrator. The lack of knowledge in cybersecurity gives them great advantage for hackers to perform attacks and cause the data breach in the organization.

Type of Social Engineering Attack.

You found many of the social engineering attacks that can be used by the threat actor. Some of them are :

  1. Spoofing
  2. Phishing
  3. Vishing
  4. Tailgating
  5. Baiting

 

  1. Spoofing: A form of attack where,” what we see will look it, but it is not”.When you define this term then you come to know how this works. Spoofing is nothing but disguising as a legitimate source in order to gain sensitive information that can gain access to something. The attacker always plays tricks to believe us that you are accessing the original source by spoofing.
  2. Phishing: The most simple and effective attack a hacker can use to steal credentials like username, password, social security number, organization secrets, or credit card details. Sometimes the phishing is mainly used to spread malware inside a network. The phishing involves social engineering and Spoofing.
  3. Vishing: It is similar to the phishing that involves calling the victims and pretending as a legitimate caller.When the victim believes that without suspicion they can easily gain access to sensitive information like network structure, employee details, company account details, etc.
  4. Tailgating: A technique that is used by the threat actors that can enter an organization building. During the cyberattack, the threat actors can wait for an employee/ person to enter inside where the access for the outsiders which can restrict and follow them from inside the building once they use their access cards or access key to open the door.
  5. Baiting: In this process, the threat actor can create baits such as USB flash drives, CD-ROMs, Floppy disk, or card readers. Basically they create a folder inside the devices such as projects, revised payrolls of the organization, and drop them in sensitive areas ( Rest Rooms, Elevators, Cafeterias, and parking lots) they found the place where employees move a lot.

Once the employee picks the USB and insert it in the PC, the script inside the device runs
and gave full control to the hackers. This method of social engineering is called Baiting.

 

If you feel any suggestions for this article. You can comment. 

The post What is Social Engineering ? How thing work inside ? appeared first on Vednam.

]]>
https://vednam.com/what-is-social-engineering-how-thing-work-inside/feed/ 0
What is spoofing ? What are the types and prevention measure ? https://vednam.com/what-is-spoofing-what-are-the-types-and-prevention-measure/ https://vednam.com/what-is-spoofing-what-are-the-types-and-prevention-measure/#comments Wed, 10 Jun 2020 12:49:15 +0000 https://vednam.com/?p=854 Spoofing is an act or practice which can be disgusting as a legitimate source and gain sensitive information which can help the attacker to gain the victim’s device. The threat actor as you called him attacker which trick you and let you believe that you are using the right source but that was not the […]

The post What is spoofing ? What are the types and prevention measure ? appeared first on Vednam.

]]>
Spoofing is an act or practice which can be disgusting as a legitimate source and gain sensitive information which can help the attacker to gain the victim’s device. The threat actor as you called him attacker which trick you and let you believe that you are using the right source but that was not the right source.

Spoofing can be done with emails, phone calls, and websites or maybe more technical words used for spoofing is an IP address spoofing. The Address Resolution Protocol (ARP) or Domain Name System (DNS) server.

Basically spoofing can be used for the access of victims’ personal information which can be done by the infected links and attachment even sometimes they use a bypass method to take control of network access. Sometimes a large scale of campaigns is executed by these methods and where they act as a man-in-the-middle and advanced persistent threats.

How does this Campaign work?

Spoofing may apply to the number of methods that may employ various levels of technical know-how. Spoofing can be alternatively used for phishing attacks which can scam to gain sensitive information from the individual or organizations.

What are the Types of Spoofing?

There are lots of spoofing categories that are used on a daily basis attack. The main purpose of the attack is to gain access to the victims through anyway. Let’s take some look at the type of the Spoofing :

Email Spoofing: The mostly used and advanced used spoofing attacks. When the attacker uses the mailing system to trick the recipient into thinking and came from a known and trusted source where emails are linked with the malicious website and the attachment infected with malware or they may use the method of social engineering to convince the recipient they are not doing wrong.

Sender information can be a spoof and that can be done in one of the two ways as pointed below :

  1. Maybe you got a mail from the trusted mail or domain name should be using alternate letters or numbers which are slightly different from the original one.
  2. Disgusting the from field to be the exact email address which you want to access that make you trust on that

Caller ID Spoofing: The caller ID spoofing may be used by attackers to appear as if the phone calls are coming from a specific number which can seem like known and unknown and you can believe that it was from the trusted one. The attacker uses social engineering which may often pose someone from the bank and customer support -make them convenience and targets them over the phone which can help them to know sensitive data such as password and account information.

Website Spoofing: Website spoofing is more simple than the other spoofing process because in this the attacker can clone the banking and another financial website, After that, they purchased a similar domain with one letter misplaced and send you the mail and after that when you open the mail. You don’t see the mail is the part of the attack because that looks so similar that you can’t differentiate. Attackers use these sites to gain the login id and password from the user.

IP spoofing: The threat master uses IP(Internet protocol ) spoofing methods that can disguise a computer IP address after hiding the identity of the sender or impersonating another machine. The only purpose of the IP spoofing is to gain access to the networks that can authenticate the users based on IP addresses.

The attackers will spoof the target’s IP address in the denial-of-service attack which can overwhelm the victim with traffic and that sends the packers multiple times to the network recipients.

ARP Spoofing: This protocol which use to resolve the IP address to MAC address for 

Transmitting the data. ARP spoofing is directly linked with the attacker’s MAC to legitimate the network IP address which can receive data meant for the owner associated with that IP address. This attack practice is also used for stealing that data and even used for DDoS attacks.

DNS Server Spoofing: DNS basically resolves the IP address in the Website name. DNS attack is used for the attackers to divert the traffic to different IP addresses and let victims spread malware.

How to prevent spoofing?

The main thing you can do is be aware of the email, web, and phone access if you feel the sign of attack then leave there.

When you get any spoofing links :

  1. Find the poorer spelling
  2. Incorrect grammar mistakes
  3. Unusual sentences and the structure of phrases.

The other things you can do is :

  1. Please check the email sender address which can be used for attack, even check the letter after the @ because it gives the clarity of the trusted domain from the attacker.
  2. The URL of the web page looked similar but please verify it was authenticated to use the webpage or it was a trick with you.

Don’t follow the link which looked spoofed and doesn’t click the attachments which can be received through email.

Don’t respond on phone as soon as possible because that may be the attack process do conversation face to face that may help in trusting the information sharing,

If you want to share any suggestions. Drop your suggestion in the comments.

 

The post What is spoofing ? What are the types and prevention measure ? appeared first on Vednam.

]]>
https://vednam.com/what-is-spoofing-what-are-the-types-and-prevention-measure/feed/ 1