<body>

Hands-on Project 4-3

Date: Saturday, June 05, 2010


Hands-on Project 4-3 : Hosts File Attack

Before I do this practical, I go to http://www.course.com/
The webpage displayed properly.


Go to C:\Windows\System32\drivers\etc to open the hosts file.


Added in the last sentence: 74.125.47.99  http://www.course.com/
(74.125.47.99 is the IP address for http://www.google.com/)


after I make changes to the host, I entered http://www.course.com/, but google page displayed instead


Reflection:
Usually when we type a URL in the web browser’s address bar, it make queries to DNS and try to resolve the domain name to an IP address. But if we use the host file, it will check the host file before querying the DNS, thus bypass the usual process. Some hijackers make use this host file attack to redirect popular sites to their websites. In this practical, I redirected http://www.course.com/ to 74.125.47.99, which is the IP address for http://www.google.com/. Thus in the later part of the practical when I tried to visit http://www.course.com/ again, I failed. However, other than that, this technique is also very useful in blocking sites that are well known for bad behavior. Through this hands-on project I learnt that the same kind of technique could do both bad and good deeds depend on how the users use it.

Labels: ,


林小颍's work ^—^V