Loading vulnerability page...
DNS Spoofing / Cache Poisoning
Watch a normal DNS question get answered with a lie, redirecting the user to a fake website.
Real website
This is the legitimate destination the user expected, but it stays out of reach in the background.
Fake login page
The user sees a familiar-looking page, even though the route was poisoned earlier.
Misdirected trust
The user typed a correct name, but the poisoned DNS answer quietly changed the destination and led them to the attacker-controlled site.
Quick understanding
Real tips to reduce risk
DNS spoofing changes the answer to a lookup. The user can type the correct site name but still be routed somewhere malicious.
It breaks trust at the routing layer, so users may land on convincing fake pages before they realize anything is wrong.
Protect DNS trust with secure resolvers, HTTPS validation, DNSSEC-aware infrastructure, and careful warning handling.
Unexpected logins, certificate warnings, wrong pages behind familiar names, or traffic heading to strange IPs can all be clues.