Pharming

Pharming



Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.

While a typical website uses a domain name for its address, its actual location is determined by an IP address. When a user types a domain name into his or her Web browser's address field and hits enter, the domain name is translated into an IP address via a DNS server. The Web browser then connects to the server at this IP address and loads the Web page data. After a user visits a certain website, the DNS entry for that site is often stored on the user's computer in a DNS cache. This way, the computer does not have to keep accessing a DNS server whenever the user visits the website.

One way that pharming takes place is via an e-mail virus that "poisons" a user's local DNS cache. It does this by modifying the DNS entries, or host files. For example, instead of having the IP address 17.254.3.183 direct to www.apple.com, it may direct to another website determined by the hacker. Pharmers can also poison entire DNS servers, which means any user that uses the affected DNS server will be redirected to the wrong website. Fortunately, most DNS servers have security features to protect them against such attacks. Still, they are not necessarily immune, since hackers continue to find ways to gain access to them.

要查看或添加评论,请登录

Shivam Singh的更多文章

  • Investor Proposal

    Investor Proposal

    Hello I hope you find this in a healthy state. I am Shivam from AllinOne Cyberteam and we are looking for an investor…

  • Botnet

    Botnet

    A botnet is a logical collection of internet-connected devices such as computers, smartphones or IoT devices whose…

  • Spyware

    Spyware

    Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive…

  • How To Secure Rooted Android From Security Threats

    How To Secure Rooted Android From Security Threats

    The below tips are helpful and efficient, and you should implement them today to make sure that apps for your rooted…

  • Union Based SQLI

    Union Based SQLI

    Union Based SQLI Requirements :- ? SQL Injection Dorks. ? Vulnerable Website.

  • Google Dork

    Google Dork

    A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to…

  • Data Breach

    Data Breach

    A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted…

  • What is Footprinting?

    What is Footprinting?

    Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude…

  • What is SQL Injection?

    What is SQL Injection?

    SQL injection attack is a code injection technique or method, which is used to attack data driven applications. In this…

  • Phases of Ethical Hacking

    Phases of Ethical Hacking

    Like every discipline out there in the world, ethical hacking is divided into distinct phases. Ethical hacking has 6…

社区洞察

其他会员也浏览了