Name |
DNS Blocking |
|
Likelyhood of attack |
Typical severity |
High |
Very High |
|
Summary |
An adversary intercepts traffic and intentionally drops DNS requests based on content in the request. In this way, the adversary can deny the availability of specific services or content to the user even if the IP address is changed. |
Prerequisites |
This attack requires the ability to conduct deep packet inspection with an In-Path device that can drop the targeted traffic and/or connection. |
Solutions | Hard Coded Alternate DNS server in applications Avoid dependence on DNS Include "hosts file"/IP address in the application. Ensure best practices with respect to communications channel protections. Use a .onion domain with Tor support |
Related Weaknesses |
CWE ID
|
Description
|
CWE-300 |
Channel Accessible by Non-Endpoint |
|
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-603 |
An adversary blocks the delivery of an important system resource causing the system to fail or stop working. |
|