Tagged articles
14 articles
Page 1 of 1
Black & White Path
Black & White Path
May 4, 2026 · Information Security

Metasploit New Modules: DHCP Exhaustion + DNS MITM for Internal Network Takeover

The article explains how Metasploit’s new auxiliary modules—dhcp_exhaustion/exhaust and dns_mitm/dns_mitm—can be combined to exhaust a DHCP server’s address pool, impersonate it, and redirect DNS queries to a malicious server, enabling attackers to gain network control while outlining defensive measures such as DHCP snooping and ARP inspection.

DHCP exhaustionDNS hijackingMetasploit
0 likes · 4 min read
Metasploit New Modules: DHCP Exhaustion + DNS MITM for Internal Network Takeover
Java Tech Enthusiast
Java Tech Enthusiast
Aug 11, 2024 · Information Security

Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod

Tencent Cloud DNSPod uncovered a massive May‑2024 campaign that hijacked home routers by altering their DNS settings to malicious IPs—using default credentials and firmware flaws—to redirect users to phishing or illegal sites, urging owners to check router DNS, reset devices, and change passwords.

DNS hijackingdig commandmalicious DNS
0 likes · 5 min read
Mass Home Router DNS Hijacking Detected by Tencent Cloud DNSPod
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Overview of Common Information Security Techniques: Network, System, and Cryptography

This article provides a comprehensive overview of essential information security technologies, covering network attacks such as SQL injection, XSS, CSRF, DDoS, DNS and TCP hijacking, system vulnerabilities like stack overflow and privilege escalation, and core cryptographic concepts including symmetric/asymmetric encryption, key exchange, hashing, encoding, and multi‑factor authentication.

DDoSDNS hijackingSQL injection
0 likes · 23 min read
Overview of Common Information Security Techniques: Network, System, and Cryptography
DevOps
DevOps
Feb 10, 2022 · Operations

Eight Real-World Online Failure Cases and Their Resolution Strategies

The article presents eight authentic production incidents—including JVM Full GC, memory leaks, idempotency flaws, cache avalanches, disk‑I/O thread blocking, MySQL deadlocks, DNS hijacking, and bandwidth exhaustion—detailing their causes, diagnostics, and practical remediation steps for engineers.

Bandwidth ExhaustionDNS hijackingDatabase Deadlock
0 likes · 15 min read
Eight Real-World Online Failure Cases and Their Resolution Strategies
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Aug 24, 2021 · Information Security

How NetEase Cloud IM SDK Prevents DNS Hijacking with HttpDNS High‑Availability

This article explains the DNS hijacking threat, shares a real incident affecting NetEase Cloud IM, and details a comprehensive high‑availability architecture—including HttpDNS, laddered HTTP requests, caching strategies, and SNI handling—that protects the SDK from DNS attacks and ensures reliable service.

CacheDNS hijackingHTTPDNS
0 likes · 13 min read
How NetEase Cloud IM SDK Prevents DNS Hijacking with HttpDNS High‑Availability
Open Source Linux
Open Source Linux
Apr 2, 2021 · Fundamentals

How DNS Works: From Resolution to Proxy and Hijacking Explained

This article explains what DNS is, walks through the step‑by‑step resolution process for a typical website, describes DNS caching, introduces DNS proxy functionality for simplified network management, and warns about DNS hijacking and how to mitigate it.

DNSDNS ProxyDNS hijacking
0 likes · 5 min read
How DNS Works: From Resolution to Proxy and Hijacking Explained
dbaplus Community
dbaplus Community
Aug 11, 2020 · Operations

7 Real-World Production Failures and Fast Diagnosis Techniques

The article shares seven authentic production incident cases—from JVM Full GC spikes and memory leaks to cache avalanches, disk I/O blocks, database deadlocks, DNS hijacking, and bandwidth exhaustion—detailing root causes, step‑by‑step troubleshooting methods, code snippets, and practical mitigation strategies for engineers.

DNS hijackingDatabase DeadlockJVM
0 likes · 17 min read
7 Real-World Production Failures and Fast Diagnosis Techniques
ITPUB
ITPUB
May 29, 2018 · Information Security

How Roaming Mantis Malware Hijacks DNS to Infect Android, iOS, and PCs

The Roaming Mantis malware exploits compromised routers to perform DNS hijacking, redirecting Android, iOS, and desktop users to malicious sites that install fake updates, steal credentials, and run CoinHive mining scripts, while spreading across more than twenty languages worldwide.

AndroidDNS hijackingcoin mining
0 likes · 6 min read
How Roaming Mantis Malware Hijacks DNS to Infect Android, iOS, and PCs
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Jul 21, 2016 · Information Security

How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential

This article explains how DNS hijacking injects unwanted ads by exploiting HTTP's lack of encryption, identity verification, and integrity checks, and demonstrates how HTTPS, with SSL/TLS encryption, certificates, and integrity validation, protects users from such attacks while also discussing performance impacts.

Certificate AuthorityDNS hijackingHTTPS
0 likes · 15 min read
How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential
21CTO
21CTO
Jun 10, 2016 · Information Security

Understanding HTTP & DNS Hijacking: Causes, Risks, and Practical Countermeasures

This article explains what HTTP and DNS hijacking are, illustrates real-world examples, analyzes root causes such as ad injection and malicious attacks, and presents concrete anti‑hijacking techniques like data legitimacy checks, timeliness verification, HttpDNS, and operator cache mitigation.

DNS hijackingHTTP hijackingHTTPDNS
0 likes · 10 min read
Understanding HTTP & DNS Hijacking: Causes, Risks, and Practical Countermeasures
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Jun 7, 2016 · Information Security

Understanding HTTP and DNS Hijacking: Causes, Impacts, and Countermeasures

The article explains what HTTP and DNS hijacking are, illustrates real‑world examples, analyzes root causes such as ad injection and ISP caching, describes the resulting harms, and presents practical anti‑hijack techniques including data validation, HttpDNS, and logging strategies.

DNS hijackingHTTP hijackinganti‑hijack
0 likes · 8 min read
Understanding HTTP and DNS Hijacking: Causes, Impacts, and Countermeasures
21CTO
21CTO
Feb 2, 2016 · Fundamentals

Master DNS: From Domain Registration to Detecting Hijacks

This guide explains how to register and bind domain names, use DNS tools like dig and nslookup to query records, trace resolution paths, and identify common DNS issues such as domain squatting, hijacking, and spoofing, providing practical security insights.

DNSDNS hijackingDNS spoofing
0 likes · 13 min read
Master DNS: From Domain Registration to Detecting Hijacks
Architect
Architect
Jul 19, 2015 · Information Security

Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps

This article explains the mechanisms of HTTP and DNS hijacking, illustrates real‑world examples, analyzes their causes and impacts on mobile applications, and presents practical anti‑hijacking techniques such as data validation, HttpDNS, ISP cache handling, illegal redirect blocking, and monitoring strategies.

DNS hijackingHTTP hijackingMobile Security
0 likes · 10 min read
Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps