DNS hijacking
Subverting the resolution of Domain Name System (DNS) queries, typically by overriding a computer’s TCP/IP configuration to point at a rogue DNS server under the attacker’s control, or by modifying...
Subverting the resolution of Domain Name System (DNS) queries, typically by overriding a computer’s TCP/IP configuration to point at a rogue DNS server under the attacker’s control, or by modifying...
Subverting the resolution of Domain Name System (DNS) queries, typically by overriding a computer’s TCP/IP configuration to point at a rogue DNS server under the attacker’s control, or by modifying...
A technique for keeping a malicious botnet in operation by constantly changing the botnet command-and-control server’s domain name using a domain-generation algorithm. Domain fluxing makes it difficult for network administrators...
An attack technique in which the attacker impersonates a trusted domain to lure a victim. Compare phishing, homographic attack.
A malicious download that occurs when a victim visits a site infested with an exploit kit designed to install its payload in devices that visit that site.
An information-gathering technique in which an attacker roots through the physical garbage of a potential target, looking for information that might be useful in subsequent attacks. It might be used...