Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS server in order to carry out URL redirection?

Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS
server in order to carry out URL redirection?

Which of the following exploits either a host file on a target machine or vulnerabilities on a DNS
server in order to carry out URL redirection?

A.
Pharming

B.
Spoofing

C.
Vishing

D.
Phishing



Leave a Reply to hab Cancel reply8

Your email address will not be published. Required fields are marked *

three × 5 =


MM

MM

The answer is not pharming, its spoofing

bobh61

bobh61

Its pharming, As far as I know you spoof hardware address to get access or to redirect the network to your fake MAC. Here is the definitions from Professor Messer’s notes.
Pharming
Redirection to a bogus site
Combines farming with phishing
Farming – Harvest large groups of people
Phishing – Collect access credentials
Difficult for anti-malware software to stop
Everything appears legitimate to the user

Spoofing
Pretend to be something you aren’t
Fake web server, fake DNS server, etc.
Email address spoofing
The sending address of an email isn’t really the sender
Man-in-the-middle attacks
The person in the middle of the conversation pretends to be both endpoints
Caller ID spoofing
The incoming call information is completely fake

Lake

Lake

The answer is Pharming. Please referto page 321 and 322 on the textbook.

Yam

Yam

Pharming is the correct answer.

Admin

Admin

Pharming is a cyber attack intended to redirect a website’s traffic to another, fake site. Pharming can be conducted either by CHANGING THE HOSTS FILE on a victim’s computer or by exploitation of a vulnerability in DNS server software.

hab

hab

Pharming is right