ELI5: What are DNS Attacks?

The internet has a phone book that turns website names (like “google.com”) into the actual addresses computers use. DNS attacks mess with that phone book. It’s like if someone secretly changed the phone number next to your friend’s name so that when you call them, you actually reach a stranger pretending to be your friend. The stranger could trick you into sharing secrets. DNS attacks redirect people to fake websites without them ever knowing the address was swapped.

Overview

DNS attacks exploit the Domain Name System — the internet’s directory service that translates domain names to IP addresses. Because nearly all internet communication begins with a DNS query, compromising DNS allows attackers to redirect users to malicious sites, intercept sensitive data, or disrupt internet access entirely. DNS was designed without security in mind, making it inherently vulnerable without additional protections.

Key Concepts

  • DNS cache poisoning: Injecting false DNS records into a resolver’s cache so users are directed to attacker-controlled servers
  • DNS spoofing: Forging DNS responses to redirect queries to malicious IP addresses
  • DNS hijacking: Compromising a domain’s DNS settings (at the registrar or DNS server) to redirect all traffic
  • DNS tunneling: Encoding data within DNS queries and responses to exfiltrate data or establish command-and-control channels
  • DNS amplification: Using open DNS resolvers to amplify DDoS attacks by sending small queries that generate large responses
  • Domain hijacking: Taking control of a domain name through social engineering the registrar or exploiting weak account security
  • URL hijacking: Registering domains similar to legitimate ones (e.g., googel.com) to capture mistyped URLs
  • DNSSEC (DNS Security Extensions): Adds digital signatures to DNS records to verify authenticity and integrity
  • DNS over TLS (DoT): Encrypts DNS queries to prevent eavesdropping and manipulation

Exam Tips

Remember

DNS poisoning = fake records in cache. DNS tunneling = data exfiltration via DNS queries. DNSSEC = integrity (digital signatures, NOT encryption). DoH/DoT = confidentiality (encrypts DNS traffic).

  • DNS tunneling is hard to detect because DNS traffic is almost always allowed through firewalls
  • DNSSEC prevents poisoning but does NOT encrypt DNS traffic — that is DoH/DoT
  • Monitor for unusually large or frequent DNS queries as indicators of DNS tunneling

Connections

Practice Questions

Scenario

See case-dns-attacks for a practical DevOps scenario applying these concepts.