Spoofing Fully Qualified Domain Names
Spoofing Fully Qualified Domain Names
How can you spoof a FQDN? John Hohn covers the history of DNS and name registry to demonstrate a flaw/feature that allows for the spoofing of fully qualified domain names. Learn how a Puny code vulnerability can be used by hackers to redirect unsuspecting browsers to malicious or spoofed sites.