Understanding a DNS Spoofing Attack + Evilgrade
What does this type of attack consist of? One of the most dangerous attacks that we can encounter is the self-downloading and execution of malicious software without user interaction. With an attack of these characteristics an intrusion can be made in any type of system, even if it is at its last version and completely patched, not presenting any type of vulnerability more than the one that represents in itself the ignorance of the own user. Design of the attack and tools used To demonstrate this attack we are going to use the “Evilgrade” framework. As a brief description of …