Ethical Hacking 03: Malicious URL Redirects Hosted File

malicious url, url redirects, hosts file, unbeknownst greater, greater part, part today, today end, end users, users, presence, presence malilcious

Unbeknownst to the greater part of today, end users are the presence of a malicious URL redirects and DNS Poisoning-related file named Hosts. Found under "C: windows system32 riverstc" in sections that created link in IP addresses.


The Hosts file was initially utilized by DNS as a way for hosts to search name-to-IP address queries without touching DNS servers and perform recursive name goals. 

Generally, DNS works fine and dandy, and most people never notice with their Hosts' files, however, it's there. 


Programmers and attackers love to create and distribute their own files to Hosts, with the goal that when somebody types in a well-known domain name. Example: domain.com!

They are redirected to some websites, surprisingly.

The Host attack redirection contains an ideal duplicate of the most look-a-like site, so the affected user is ignorant of the behavior. This exploit is still working on the world wide web today.


Hacking Tips

If you can't sort out why you're overall being hosts redirected, look at your Hosts file.