top | item 47168652

(no title)

amiljkovic | 3 days ago

The Ars article mentions: “Even when HTTPS is in place, an attacker can still intercept domain look-up traffic and use DNS cache poisoning to corrupt tables stored by the target’s operating system.” Not sure, but I think this could then be further used for phishing.

discuss

order

jcalvinowens|3 days ago

DNSSEC prevents that if set up properly.

tptacek|2 days ago

This is an on-path attacker. In end-user DNS configurations, attackers can simply disable DNSSEC; it's 1 bit in the DNS response header ("yeah, sure, I verified this for you, trust me").