01:10:02 Sir in this section, you mentioned that attacker modify cache on authoritative server (for cache poisoning). But cache is present on DNS resolver to make DNS process faster. Authoritative server contains actual record, not cache. Right? I mean to say if attacker poisons cache, he/she will do on DNS resolver not on name server. Also, if attacker give its own IP address to DNS resolver before DNS resolver get any response from legitimate DNS server, then that will not be considered as cache poisoning because until this point cache is not maintained on DNS resolver.
Very informative video :-->>many thanks for posting
Sir, what is an application signature and how does a firewall monitor traffic based on it? Could you please shed some light on this.
01:33:15 Sir common name or Canonical name (for CNAME)??
Thank you very much for sharing your precious knowledge.
thanks for the feedback
01:10:02 Sir in this section, you mentioned that attacker modify cache on authoritative server (for cache poisoning). But cache is present on DNS resolver to make DNS process faster. Authoritative server contains actual record, not cache. Right? I mean to say if attacker poisons cache, he/she will do on DNS resolver not on name server. Also, if attacker give its own IP address to DNS resolver before DNS resolver get any response from legitimate DNS server, then that will not be considered as cache poisoning because until this point cache is not maintained on DNS resolver.
Isnt that IN in class is internet not India. 2:31:18?
Nice