T 5.152 DNS hijacking

DNS hijacking is a method of attack used to route the communications between advertising DNS servers and resolvers via the IT system of an attacker. It is thus a man-in-the-middle attack. Communications do not take place directly between the two communication partners, but are routed via a third party.

The attacker can now listen in on and record communications. The far greater risk, however, is that a successful attacker is able to change any traffic of the two communication partners in any way. An attacker is thus able to:

If a request is sent by the resolver of a client IT system to a DNS server after a DNS hijacking attack has been completed successfully, then the attacker can, for example, modify the allocation of name and IP address according to his/her wishes and needs, regardless of whether it is an advertising or a resolving DNS server.

DNS hijacking can also be combined with other forms of attack; phishing in particular is ideal in this case. When phishing (derived from "password" and "fishing") is carried out, passwords or similar information are elicited from users (for example, see also T 5.42 Social Engineering and T 5.78 DNS spoofing) in order to sell this data or to use them for one's own advantage.

Example: