logo
DNS Abuse Techniques Matrix
Local recursive resolver hijacking
  • English
  • Japanese
Initializing search
    • Index
    • Actions
    • Techniques
      • DGAs
      • Domain name compromise
      • Lame delegations
      • DNS cache poisoning
      • DNS rebinding
      • DNS server compromise
      • Stub resolver hijacking
      • Local recursive resolver hijacking
      • On-path DNS attack
      • DoS against the DNS
      • DNS as a vector for DoS
      • Dynamic DNS resolution (as obfuscation technique)
      • Dynamic DNS resolution: Fast flux (as obfuscation technique)
      • Infiltration and exfiltration via the DNS
      • Malicious registration of (effective) second level domains
      • Creation of malicious subdomains under dynamic DNS providers
      • Compromise of a non-DNS server to conduct abuse
      • Spoofing or otherwise using unregistered domain names
      • Spoofing of a registered domain
      • DNS tunneling - tunneling another protocol over DNS
      • DNS beacons - C2 communication
    • Stakeholders
    • Abuse Matrices

    Local recursive resolver hijacking

    Consumer Premise Equipment (CPE), such as home routers, often provide DNS recursion on the local network. If the CPE device is compromised, the attacker can change the recursive resolver behavior; for example, by changing responses.

    Previous
    Stub resolver hijacking
    Next
    On-path DNS attack
    FIRST DNS Abuse Special Interest Group
    TLP:CLEAR