Too Long; Didn't Read
The Domain Name System is a protocol that translates human-friendly URLs into IP addresses. Hackers can use DNS to establish a command and control (C2) which would allow them to gain unauthorized access into a network and be able to exfiltrate data. A DNS attack is when a hacker exploits vulnerabilities in the DNS service itself. There are two general types of attacks on DNS: DDoS attacks and DNS poisoning attacks. In the upcoming section I will go into detail about some of the most common types of DNS attacks.