[Linux] dns domain name resolution service

1. DNS 1.1 Introduction to DNS Domain name resolution: (English: Domain Name System, abbreviation: DNS) is a service of the Internet. As a distributed database that maps domain names and IP addresses to each other, it can make people access the Internet more conveniently. DNS uses udp53 and tcp53. Currently,the length limit for each level […]

Typical configuration of DNS server in Linux

Table of Contents BIND installation and deployment Forward analysis Programming zone configuration file Programming data configuration file Change the DNS address parameters in the network card to the local IP address (127.0.0.1) Reverse analysis Programming zone configuration file Programming data configuration file Check the results. Change the DNS address parameter in the network card to […]

Linux network DNS service

Table of Contents 1. Introduction to DNS service 1. Basic concepts 2.Domain name classification 3.DNS server type 2. DNS principle 1. Query method 2. Query principle process 3. Configuration file 1. Configuration file location ①. Main configuration file ②. Regional configuration file ③. Database configuration file 2. Resource records 4. Forward analysis steps 1. Experimental […]

“Network Protocol” 04. Application layer (DNS & DHCP & HTTP)

title: “Network Protocol” 04. Application layer (DNS & DHCP & HTTP) date: 2022-09-05 14:28:22 updated: 2023-11-12 06:55:52 categories: Learning Record: Network Protocol excerpt: Application layer, DNS, DHCP, HTTP (URI & URL, ABNF, message format, request method, status code, header field, Form submission, same-origin policy). comments: false tags: top_image: /images/backimg/SunsetClimbing.png Network Protocol 1: Network interconnection model […]

Openwrt installs the latest method of AdGuard Home and MosDNS v5.3.1

AdGuard Home installation method The first one: docker installation adguardhome https://hub.docker.com/r/adguard/adguardhome SSH to router Pull Docker image This command will pull the latest stable version docker pull adguard/adguardhome Install the container manually Mosdns installation method: Open the website: https://github.com/IrineSistiana/mosdns https://irine-sistiana.gitbook.io/mosdns-wiki/mosdns-v4 Install prebuilt packages Log in to OpenWrt Terminal (SSH) Install curl package opkg update opkg […]

Revealing the principle of DNS resolution in docker containers

Background While using docker these days, I encountered some problems with DNS resolution in the container. So I took some time to figure out the principle and wrote this article to share. 1. Container started by docker run command Take starting a busybox container as an example: root@ubuntu20:~# docker run -itd –name u1 busybox 63b59ca8aeac18a09b63aaf4a14dc80895d6de293017d01786cac98cccda62ae […]

Exploring network attacks: ARP disconnection, ARP spoofing and DNS spoofing experimental analysis

Table of Contents Preface 1. Overview of ARP 1.1 What is ARP 1.2 Basic functions of ARP protocol 1.3 ARP cache table 1.4 Common ARP commands 2. ARP disconnection experiment 3. ARP spoofing experiment 3.1 Pictures intercepted from the intranet 3.2 Obtain HTTP account password 4. DNS spoofing experiment Summarize Hi! I am Filotimo__. Nice […]

About disabling cluster ipv6 DNS requests

The article is reproduced from: https://blog.51cto.com/mahmut/8141303 Environment: System: Tongxin Youyue 1060A Cluster: Tongxin Youque bare metal deployment Source of the problem Youque cluster basic node DNS configuration copy <code>[root@bastion ~]# cat /etc/coredns/Corefile .:53 { template IN A apps.utccp.example.com { match .*apps\.utccp\.example\.com answer “{<!– –>{ .Name }} 60 IN A 10.12.24.125” fallthrough } hosts { 10.12.24.125 […]

8. W5100S/W5500+RP2040 Raspberry Pi Pico<DNS>

Article directory 1 Introduction 2 Introduction to the protocol 2.1 What is DNS 2.2 Advantages of DNS 2.3 How DNS works 2.4 Application scenarios 3 WIZnet Ethernet chip 4 DNS Network Settings Example Overview and Usage 4.1 Flowchart 4.2 Core preparation work 4.3 Connection method 4.4 Main code overview 4.5 Burning Verification 5 things to […]

Man-in-the-middle attack DNS spoofing

Foreword Some time ago, I learned about man-in-the-middle attacks and wrote an article to record them. Principle introduction What is a man-in-the-middle attack? Man-in-the- MiddleAttack (referred to as “MITM attack”) is an “indirect” intrusion attack. This attack mode uses various technical means to virtually place a computer controlled by the intruder between two communicating computers […]