z-logo
open-access-imgOpen Access
Exploitnig DNS Server Vulnerabilites Using Linux Operating System
Author(s) -
Aysar A. Abdulrahman,
Alaa Khalil Jumaa
Publication year - 2016
Publication title -
international journal of computer and technology
Language(s) - English
Resource type - Journals
ISSN - 2277-3061
DOI - 10.24297/ijct.v15i9.636
Subject(s) - exploit , domain name system , hacker , computer science , computer security , copying , the internet , operating system , computer network , political science , law
Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer. Exploiting domain name system (DNS) vulnerabilities have resulted in a range of high profile disruptions and outages for major internet sites around the world. DNS attack is an exploit in which an attacker takes advantage of vulnerabilities is the (DNS). This paper will present the vulnerabilities and the weak points of the DNS server and how attackers (black hat hakcer) can exploit those vulnerabilities to attack and gain access to the server machine. In conclusion, presenting and implementing this project make users understand the hazard of hackers. Then, will lead to build secure and protected systems and applications.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here