logo
DNS Abuse Techniques Matrix
Stub resolver hijacking
  • English
  • Japanese
Initializing search
    • Index
    • Actions
    • Techniques
      • DGAs
      • Domain name compromise
      • Lame delegations
      • DNS cache poisoning
      • DNS rebinding
      • DNS server compromise
      • Stub resolver hijacking
      • Local recursive resolver hijacking
      • On-path DNS attack
      • DoS against the DNS
      • DNS as a vector for DoS
      • Dynamic DNS resolution (as obfuscation technique)
      • Fast flux
      • Infiltration and exfiltration via the DNS
      • Malicious registration of (effective) second level domains
      • Creation of malicious subdomains under dynamic DNS providers
      • Compromise of a non-DNS server to conduct abuse
      • Use of an unregistered domain
      • Spoofing of a registered domain
      • DNS tunneling
      • DNS beacons - C2 communication
    • Stakeholders
    • Abuse Matrices

    Stub resolver hijacking

    The attacker compromises the Operating System of a computer or a phone with malicious code that intercepts and responds to DNS queries with rogue or malicious responses

    Previous
    DNS server compromise
    Next
    Local recursive resolver hijacking
    FIRST DNS Abuse Special Interest Group
    TLP:CLEAR