Online ads/page hijacking: In fact, DNS is 'polluted”!
Since entering the Internet age, everyone’s life has become more colorful, but there are also many more worries. For example, the large groups of garbage and abyss that appear from time to time in the ocean of information are hard to guard against.
What I’m talking about here is when I encounter inexplicable web page jumps while surfing the Internet. A perfectly good web page suddenly turns into a screen full of advertisements; or a page that can be accessed normally suddenly cannot be opened, but QQ and the like The software can log in normally. What is the cause of this? In fact, the occurrence of these disturbing anomalies means that you may be a victim of DNS hijacking and poisoning.
Although we often surf the Internet, not everyone understands the mechanism behind opening a web page. With a click of the mouse, the web page appears in front of you. It is a familiar operation, but behind this familiar operation, there is a set of interlocking processes.
From when the user clicks the mouse, presses Enter, to the web page display, the information will first be sent through the browser, and then transferred through routing. Then DNS will resolve the domain name into IP. After finding the server, the server will send the content to the user, and then The data is forwarded by the router, and finally the browser presents the content to the user. Depending on the actual situation, there may be more levels in this process, such as firewalls, proxy servers, etc.
In this process, no matter if there is a traitor in any link such as browser, routing, DNS, server, etc., the web page may become inaccessible. Perhaps the one that has been tampered with the most is DNS.
The full name of DNS is Domain Name System. Its function is to resolve domain names into IP addresses. We can access a certain website by relying on the IP address connected to the website server. The role of DNS here is to resolve "www.baidu.com" into an IP address such as "123.125.114.144", so that You can connect to the server at this address to access the website.
Resolving the URL into an IP address is the role of DNS
In the process of surfing the Internet, there are too many factors that can affect DNS, such as your PC settings, router settings, operator settings, etc. Once an error occurs in DNS, it will be unable to resolve the domain name into Without the correct IP address, we naturally cannot access the correct page. Therefore, if you find that you cannot open a web page, but network software such as QQ that directly connects to IP can serve normally, then DNS is a very questionable reason.
DNS can be affected by too many factors, so many stakeholders will manipulate it. For example, DNS hijacking is a very common means of advertising.
Generally, if you do not set up a DNS server specifically, the DNS server will be provided by the operator. Logically speaking, the DNS server provided by the operator should be used to correctly provide you with IP jumps, but the quality of many operators' DNS servers is unsightly.
You can often see that the operator will jump you to a page for activating an Internet package. You may even enter shopping website A but be redirected to competitor B. This is what is called DNS hijacking.
Open Baidu, and the entire webpage is forced to jump to XX Entertainment City. This is a typical DNS hijacking
To deal with the operator's DNS hijacking, setting up a reliable DNS server can often solve the problem. However, many friends still cannot resolve the correct IP address after setting up a reliable DNS server. For example, the IP address of a website can obviously be pinged, but it cannot be accessed. This situation is usually caused by DNS pollution.
Although the DNS server can work normally, when we send a domain name resolution request to the DNS server, it is sent through a UDP connection. UDP is not a reliable connection, so domain name resolution requests can be intercepted halfway, and then pretend to be a DNS server and send you a wrong IP address. If the IP address is wrong, we will naturally not be able to access the website normally. We may see advertisements, phishing pages, or nothing at all.
DNS uses UDP connection by default and is not encrypted, so it is easy to be contaminated and poisoned
No matter what the situation is, a DNS error means that you cannot access the website correctly. In the entire process of surfing the Internet, the DNS link is undoubtedly fragile and beyond the control of the user. If someone must use DNS to prevent you from accessing the Internet normally, most people will be unable to do anything about it. So is there any solution to the frequent DNS errors?
As mentioned earlier, to deal with the operator's DNS hijacking, we can set up a reliable DNS server for domain name resolution. Currently, many security vendors, Internet companies and even public welfare organizations provide DNS resolution services.
For example, companies such as Qihoo 360, Norton, Comodo, Baidu, Alibaba, and Google all provide DNS resolution services. You can also choose established free DNS services such as Open DNS.
The specific IP addresses of these DNS services can be easily searched online, so I won’t list them one by one here. Of course, this does not mean that if you use these DNS services, there will be no DNS hijacking. What if the character of these companies is not good? As for who is reliable, you have to screen it yourself.
In addition, if DNS is not provided by the operator, the speed performance may not be ideal. Here we recommend a software called "DNS jumper", which can comprehensively test the DNS connection speed and set up DNS.
Using DNS jumper, it is easy to find the DNS that suits your network conditions. In addition, if the operator's DNS hijacking behavior is too rampant, you can also complain to the Ministry of Industry and Information Technology about the operator's hijacking of web pages. This is indeed a very effective method, so effective that some operators have directly blocked the Ministry of Industry and Information Technology's complaint webpage. So how to file a complaint against the operator to the Ministry of Industry and Information Technology?
First of all, if you encounter web page hijacking, do not complain directly to the Ministry of Industry and Information Technology. According to the process, you must first file a complaint with the operator. If it is invalid, the complaint will be submitted to the Ministry of Industry and Information Technology before it will be accepted. The complaint conditions posted by the Ministry of Industry and Information Technology also include the clause "You have complained to the respondent and are not satisfied with the handling result or the respondent has not responded within 15 days." Therefore, it is necessary to go through the process first in case you complain to the operator. Does this solve the problem?
However, things are often not so beautiful. The operators' answers are usually very perfunctory, and customer service staff who are unfamiliar with technology do not even understand what web hijacking means. After it is invalid, you can complain to the operator to the Ministry of Industry and Information Technology! If there are no accidents, the problem will be solved after the complaint.
But even so, if someone manipulates the UDP connection process of the DNS request, it is still impossible to prevent it. Some companies will take advantage of this principle to prevent employees from accessing the network at will. If you want to circumvent this process, the idea is to avoid DNS queries using unreliable connections like UDP. You can use some means to set DNS for TCP connection query, or you can use encryption to let other servers forward DNS requests.
IPV6 forces the deployment of IPSec, which can also make DNS more secure
Of course, these methods require a lot of effort to implement and are not suitable for general users. Perhaps when IPV6 is fully rolled out in the future, DNS security will be further improved.
In general, the current DNS mechanism obviously did not fully consider security at the beginning of its design, resulting in people with ulterior motives frequently using this link to affect users' normal network access. How can the current situation of DNS being frequently hijacked and poisoned be changed? It is technically difficult. I hope there will be more complete supervision methods in the future to allow users to have a better online experience.
The above is the detailed content of Online ads/page hijacking: In fact, DNS is 'polluted”!. For more information, please follow other related articles on the PHP Chinese website!

The Internet does not rely on a single operating system, but Linux plays an important role in it. Linux is widely used in servers and network devices and is popular for its stability, security and scalability.

The core of the Linux operating system is its command line interface, which can perform various operations through the command line. 1. File and directory operations use ls, cd, mkdir, rm and other commands to manage files and directories. 2. User and permission management ensures system security and resource allocation through useradd, passwd, chmod and other commands. 3. Process management uses ps, kill and other commands to monitor and control system processes. 4. Network operations include ping, ifconfig, ssh and other commands to configure and manage network connections. 5. System monitoring and maintenance use commands such as top, df, du to understand the system's operating status and resource usage.

Introduction Linux is a powerful operating system favored by developers, system administrators, and power users due to its flexibility and efficiency. However, frequently using long and complex commands can be tedious and er

Linux is suitable for servers, development environments, and embedded systems. 1. As a server operating system, Linux is stable and efficient, and is often used to deploy high-concurrency applications. 2. As a development environment, Linux provides efficient command line tools and package management systems to improve development efficiency. 3. In embedded systems, Linux is lightweight and customizable, suitable for environments with limited resources.

Introduction: Securing the Digital Frontier with Linux-Based Ethical Hacking In our increasingly interconnected world, cybersecurity is paramount. Ethical hacking and penetration testing are vital for proactively identifying and mitigating vulnerabi

The methods for basic Linux learning from scratch include: 1. Understand the file system and command line interface, 2. Master basic commands such as ls, cd, mkdir, 3. Learn file operations, such as creating and editing files, 4. Explore advanced usage such as pipelines and grep commands, 5. Master debugging skills and performance optimization, 6. Continuously improve skills through practice and exploration.

Linux is widely used in servers, embedded systems and desktop environments. 1) In the server field, Linux has become an ideal choice for hosting websites, databases and applications due to its stability and security. 2) In embedded systems, Linux is popular for its high customization and efficiency. 3) In the desktop environment, Linux provides a variety of desktop environments to meet the needs of different users.

The disadvantages of Linux include user experience, software compatibility, hardware support, and learning curve. 1. The user experience is not as friendly as Windows or macOS, and it relies on the command line interface. 2. The software compatibility is not as good as other systems and lacks native versions of many commercial software. 3. Hardware support is not as comprehensive as Windows, and drivers may be compiled manually. 4. The learning curve is steep, and mastering command line operations requires time and patience.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Dreamweaver Mac version
Visual web development tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

Notepad++7.3.1
Easy-to-use and free code editor

Atom editor mac version download
The most popular open source editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.