top of page
  • John Hohn

Spoofing Fully Qualified Domain Names

Spoofing Fully Qualified Domain Names

How can you spoof a FQDN? John Hohn covers the history of DNS and name registry to demonstrate a flaw/feature that allows for the spoofing of fully qualified domain names. Learn how a Puny code vulnerability can be used by hackers to redirect unsuspecting browsers to malicious or spoofed sites.

Featured Posts
Recent Posts
Posts By Category
Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare
bottom of page