CS458 Lecture Notes - Lecture 4: Dns Spoofing, Web Server, Local Area Network
Document Summary
Slide adapted from computer networking by kurose & ross. Client: transport and network layer designed in the 1970s to connect local networks at di erent universities and research labs, participants knew and trusted each other, design addressed non-malicious errors (e. g. , packet drops), but not malicious errors. Eavesdropping and wiretapping: owner of node can always monitor communication. Communication media (cont. : wifi, can be easily intercepted by anyone with a. Spoo ng: object (node, person, url, web page, email, wifi access point,. masquerades as another one, url spoo ng, exploit typos: www. uwaterlo. ca, exploit ambiguities: www. foobar. com or www. foo-bar. com, exploit similarities: www. paypa1. com, web page spoo ng and url spoo ng are used in. Phishing attacks: evil twin attack for wifi access points, spoo ng is also used in session hijacking and man-in-the-middle attacks. 4-17: sometimes, the mere existence of communication between two parties is sensitive and should be hidden.