Back to Search Start Over

Drive-By Pharming.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Qing, Sihan
Imai, Hideki
Wang, Guilin
Stamm, Sid
Ramzan, Zulfikar
Source :
Information & Communications Security (978-3-540-77047-3); 2008, p495-506, 12p
Publication Year :
2008

Abstract

This paper describes an attack concept termed Drive-by Pharming where an attacker sets up a web page that, when simply viewed by the victim (on a JavaScript-enabled browser), attempts to change the DNS server settings on the victim's home broadband router. As a result, future DNS queries are resolved by a DNS server of the attacker's choice. The attacker can direct the victim's Internet traffic and point the victim to the attacker's own web sites regardless of what domain the victim thinks he is actually going to, potentially leading to the compromise of the victim's credentials. The same attack methodology can be used to make other changes to the router, like replacing its firmware. Routers could then host malicious web pages or engage in click fraud. Since the attack is mounted through viewing a web page, it does not require the attacker to have any physical proximity to the victim nor does it require the explicit download of traditional malicious software. The attack works under the reasonable assumption that the victim has not changed the default management password on their broadband router. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540770473
Database :
Complementary Index
Journal :
Information & Communications Security (978-3-540-77047-3)
Publication Type :
Book
Accession number :
34229065
Full Text :
https://doi.org/10.1007/978-3-540-77048-0_38