{"id":10201,"date":"2022-12-05T22:12:40","date_gmt":"2022-12-05T21:12:40","guid":{"rendered":"https:\/\/dhosting.pl\/pomoc\/?post_type=manual_kb&#038;p=10201"},"modified":"2023-05-18T16:05:40","modified_gmt":"2023-05-18T14:05:40","slug":"rodzaje-spoofingu-dns","status":"publish","type":"manual_kb","link":"https:\/\/dhosting.pl\/pomoc\/baza-wiedzy\/rodzaje-spoofingu-dns\/","title":{"rendered":"Rodzaje spoofingu &#8211; DNS"},"content":{"rendered":"<h3>DNS spoofing<\/h3>\n<p><em><strong>DNS spoofing<\/strong><\/em> &#8211; czasami nazywany <em><strong>DNS cache poisoning<\/strong><\/em> &#8211; to atak, w kt\u00f3rym zmienione rekordy DNS s\u0105 wykorzystywane do przekierowania ruchu internetowego na fa\u0142szyw\u0105 stron\u0119 internetow\u0105, kt\u00f3ra przypomina miejsce docelowe. Spooferzy osi\u0105gaj\u0105 to poprzez zast\u0105pienie adres\u00f3w IP przechowywanych w serwerze DNS tymi, kt\u00f3re hakerzy chc\u0105 wykorzysta\u0107. Wi\u0119cej o atakach <em><strong>DNS spoofing<\/strong><\/em> mo\u017cna przeczyta\u0107 w naszym pe\u0142nym artykule tutaj.<\/p>\n<h3>Jak unikn\u0105\u0107 DNS spoofingu:<\/h3>\n<ul>\n<li>Dla os\u00f3b prywatnych: nigdy nie klikaj na link, kt\u00f3rego nie jeste\u015b pewien, u\u017cywaj wirtualnej sieci prywatnej (<em><strong>VPN<\/strong><\/em>), regularnie skanuj swoje urz\u0105dzenie w poszukiwaniu z\u0142o\u015bliwego oprogramowania i przep\u0142ucz pami\u0119\u0107 podr\u0119czn\u0105 DNS, aby rozwi\u0105za\u0107 problem zatruwania.<\/li>\n<li>Dla w\u0142a\u015bcicieli stron internetowych: u\u017cywaj narz\u0119dzi do wykrywania <em><strong>spoofingu DNS<\/strong><\/em>, rozszerze\u0144 bezpiecze\u0144stwa systemu nazw domen oraz szyfrowania end-to-end.<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":10957,"parent":0,"menu_order":0,"template":"","format":"standard","manualknowledgebasecat":[2880,121,118],"manual_kb_tag":[3089,3090,655,3068,3517,3058,3053,3516],"class_list":["post-10201","manual_kb","type-manual_kb","status-publish","format-standard","has-post-thumbnail","hentry","manualknowledgebasecat-bezpieczenstwo","manualknowledgebasecat-inne","manualknowledgebasecat-pozostale","manual_kb_tag-dns-cache-poisoning","manual_kb_tag-dns-spoofing","manual_kb_tag-hosting","manual_kb_tag-metody-spoofingu","manual_kb_tag-polski-hosting","manual_kb_tag-rodzaje-spoofingu","manual_kb_tag-spoofing","manual_kb_tag-web-hosting"],"_links":{"self":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb\/10201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb"}],"about":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/types\/manual_kb"}],"author":[{"embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":0,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb\/10201\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/media\/10957"}],"wp:attachment":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/media?parent=10201"}],"wp:term":[{"taxonomy":"manualknowledgebasecat","embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manualknowledgebasecat?post=10201"},{"taxonomy":"manual_kb_tag","embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb_tag?post=10201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}