⚠ DNS SPOOFING — ATTACK & DEFENSE SIMULATOR ⚠

DNS SPOOFING

Interactive Attack & Defense Simulator
Students : KHEIRDDINE Abdelmalek & DERRAR Yasser
University : USTO-MB
RSID Grp 02
What is DNS Spoofing?
🌐

DNS Explained

DNS (Domain Name System) is the internet's phonebook. It translates human-readable domains like google.com into machine IP addresses (142.250.80.46) that computers use to connect to servers.

UDP Port 53ResolverCacheTTL
☠️

The Attack

DNS Spoofing (Cache Poisoning) injects fraudulent DNS records into a resolver's cache. Victims querying a domain receive a malicious IP and are silently redirected to a fake site controlled by the attacker.

Cache PoisoningMITM

Attack Vector

Attackers exploit DNS's lack of authentication in older implementations. They race to respond before the legitimate server, flooding resolvers with forged responses using predicted 16-bit transaction IDs (0–65535).

Race ConditionBlind Spoofing
🛡️

Defenses

DNSSEC cryptographically signs DNS records. DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypt queries. Randomized source ports and transaction IDs drastically raise attack difficulty.

DNSSECDoHDoT
Choose Your Role
💀

THE ATTACKER

Learn how DNS spoofing attacks are crafted. Understand the technical steps an attacker takes to poison a DNS cache and redirect victims to malicious servers.

OFFENSIVE MODE
🧑‍💻

THE VICTIM

Experience the victim's perspective. Learn how to detect an ongoing attack, run security checks, and protect yourself from DNS spoofing attempts.

DEFENSIVE MODE
dns-spoof-simulator ~ bash
NO ROLE SELECTED
🖧
Select a Role to Begin
Choose Attacker or Victim above to launch the interactive simulation.
Live TerminalNetwork TopologyPacket LogSecurity ChecksDNS Lookup
Real-World Cases
📅

Pakistan Telecom — 2008

Pakistan Telecom accidentally hijacked YouTube's global traffic via BGP route announcement paired with DNS misrouting, taking the platform completely offline worldwide for several hours.

📅

Brazilian Banking — 2017

Attackers compromised a major Brazilian bank's DNS registrar account and redirected all 36 of the bank's domains to cloned sites for 5–6 hours, serving valid SSL certificates via Let's Encrypt.

📅

Sea Turtle Campaign — 2019

State-sponsored attackers compromised DNS registrars to redirect 40+ organizations — including government ministries and embassies — across Middle East and North Africa for intelligence gathering.

📅

Kaminsky Attack — 2008

Security researcher Dan Kaminsky discovered a critical DNS flaw enabling rapid cache poisoning via predictable transaction IDs. An emergency coordinated patch across all major DNS vendors was deployed simultaneously.