What is DNS spoofing?
Quick Answer
DNS spoofing is an attack that tricks a device or resolver into accepting a fake DNS answer, sending users to the wrong server or website.
Quick Summary
DNS spoofing changes the answer to the lookup question. Instead of getting the real IP address for a domain, the victim receives a malicious or incorrect result.
Technical explanation
Spoofing can happen in several ways: compromised routers, rogue hotspot networks, malicious software, or poisoned recursive caches. The common pattern is the same: the user thinks they are going to one destination, but DNS points them somewhere else.
Real-world examples
- A fake banking page delivered after a manipulated DNS response.
- Malware that changes the router DNS settings to a hostile resolver.
- Captive portals or filtering systems that rewrite answers and make a domain appear blocked.
Unexpected resolution results do not always mean an attack. Sometimes a blocked or failing resolver is the cause. For diagnosis, read how to check if DNS is blocked and what DNS failure means.
FAQ
Is DNS spoofing the same as cache poisoning?
Cache poisoning is one form of DNS spoofing where false records are inserted into a resolver cache.
What is the goal of DNS spoofing?
Attackers use DNS spoofing to redirect users, steal credentials, deliver malware, or disrupt services.
How do I prevent DNS spoofing?
Use trusted resolvers, enable encrypted DNS where possible, and prefer providers that validate DNSSEC.
Can home users detect DNS spoofing?
Home users can notice unexpected redirects, certificate warnings, or inconsistent DNS results across different resolvers.
Test your DNS now
Download DNS Benchmark for free and find the fastest server for your network.