Jump to first page
 -7
DNS Vulnerabilities
master
Caching forwarder
resolver
Zone administrator
Zone file
Dynamic
updates
1
2
slaves
3
Server protection
4
5
Corrupting data
Impersonating master
Unauthorized updates
Cache impersonation
Cache pollution by
Data spoofing
Data protection