SlideShare a Scribd company logo
Computer & Network  Hacker Exploits Step-by step Part 2
Stages of An Attack ,[object Object],[object Object],[object Object],[object Object]
IP Fragmentation Attacks
IP Fragmentation ,[object Object],[object Object],[object Object],[object Object],[object Object],Penetration – IP Fragments
Attacker Firewall IP=10.1.1.1 IP=10.2.1.10 Port 80 Port 23 IDS Penetration – IP Fragments Server
IP Fragmentation Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],Penetration – IP Fragments tcp ip ip
tcp ip ip Normal IP Fragmentation Penetration – IP Fragments To support different transmission media, IP allows for the breaking up of single large packets into smaller packets, called fragments. The higher‑level protocol carried in IP (usually TCP or UDP) is split up among the various fragments. ip tcp ip tcp ip tcp ip tcp ip tcp ip tcp
Tiny Fragment Attack Penetration – IP Fragments tcp ip ip Make a fragment small enough so that the TCP header is split between two fragments. The port number will be in the second fragment. ip tcp ip tcp ip tcp ip tcp ip tcp ip tcp ip
Tiny Fragment Attack ,[object Object],[object Object],Penetration – IP Fragments
Tiny Fragment Attack ,[object Object],[object Object],Penetration – IP Fragments
Attacker Firewall IDS Penetration – IP Fragments Fragment 1 (part of tcp header) Fragment 2(rest of  tcp header) Tcp port unknown All IP fragments are re-assembled  Server ip tcp ip tcp
IP Fragment Overlap Attack ,[object Object],tcp ip ip Penetration – IP Fragments ip tcp ip tcp
Attacker Firewall IDS Penetration – IP Fragments Fragment 1 (Packet is for port 80) Tcp port 80. OK! All IP fragments are re-assembled  Fragment Overlap attack  ‑ In the second fragment, lie about the offset from the first fragment. When the packet is reconstructed at the protected server, the port number will be overwritten.   Fragment 2 (Packet says  is for port 80), however, I have an offset, say 12, and After overlaying, the TCP header will read port 23! Second IP fragment was just a fragment of the first. That is OK too! Server ip tcp ip tcp
IP Fragment Attack Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Penetration – IP Fragments
Fragrouter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Penetration – IP Fragments
Sniffers
Sniffers ,[object Object],[object Object],[object Object]
Sniffers ,[object Object],[object Object],[object Object]
HUB Blah,  blah ,  blah Blah,  blah ,  blah Blah,  blah ,  blah Blah,  blah ,  blah BROADCAST ETHERNET
HUB Blah,  blah ,  blah Blah,  blah ,  blah Blah,  blah ,  blah Blah,  blah ,  blah BROADCAST ETHERNET
SWITCH Blah blah blah Blah,  blah ,  blah SWITCHED ETHERNET
Sniffers ,[object Object]
Snifferz ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Used by hackers ,[object Object]
Sniffer uses in attack ,[object Object]
Sniffit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffer Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Session Hijacking HUNT
Session Hijacking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Session Hijacking ,[object Object]
Alice Eve Alice telnets to do some work.. Eve is on a segment of the lan where she can sniff, or on a point in the path. Bob
Alice Eve Alice telnets to do some work.. Attacker can monitor and generate packets with the same sequence number. “ Hi, I am Alice” Eve uses a session hijacking tool to observe the session.  at Eve's command, the session hijacking tool jumps in and continues the session with Bob. Attacker can kick Alice off and make any changes on B. The logs will show that Alice made the changes  Bob
Alice Eve Session Hijacking: Ack Storms If the attacker just jumps in on a session, starting to spoof packets, the sequence numbers between the two sides will get out of synch As the two sides try to resynchronize, they will resend SYNs and ACKs back and forth trying to figure out what's wrong, resulting in an ACK storm SYN (A, SNa) ACK (SNb) SYN (B, SNb) ACK (SLNa) SYN(A,Sna) ACK(SNb) Bob
ACK Storm ,[object Object],[object Object]
Session Hijacking Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HUNT’s ARP Spoofing ,[object Object],[object Object],[object Object]
Alice Eve MAC=CC.CC “ ARP w.x.y.z is at DD.DD” “ ARP a.b.c.d is at EE.EE” Ip=w.x.y.z MAC=BB.BB Ip=a.b.c.d MAC=AA.AA Eve send a Gratuitous ARP broadcast message Bob
Other Session Hijacking Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Session Hijacking Tools ,[object Object],[object Object],[object Object],[object Object]
 
Session Hijacking Defenses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where to get secure shell? ,[object Object],[object Object],[object Object]
Domain Name System (DNS) Cache Poisoning
DSN Cache Poisoning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.ebay.com www.ebay.com www.ebay.com www.ebay.com Client Local Nameserver Root Name Server .com Name Server ebay.com Name Server Referral to .com Referral to ebay.com The Answer! 216.32.120.133 Clients use a "resolver" to access DNS servers Most common DNS server is BIND, Berkeley Internet Name Domain DNS servers query each other
DNS Cache Poisoning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DNS Cache Poisoning ,[object Object],[object Object],[object Object]
Alice, a happy bank customer Evil Attacker Dns.bank.com name server Alice wants to access. Dsn.good.com Alice’s unsuspecting DNS Server Dns.evil.com, Evil’s DNS server owned by evil www.bank.com, Alice’s online bank.
DNS Cache Poisoning Alice Dsn.good.com Evil Dns.evil.com www.bank.com Dns.bank.com STEP 1: Any.evil.com STEP 2: Any.evil.com STEP 3: store the query ID
DNS Cache Poisoning Alice Dsn.good.com Evil Dns.evil.com www.bank.com Dns.bank.com STEP 4: www.bank.com STEP 6: Spoofed ans: www.bank.com=w.x.y.z STEP 5: www.bank.com STEP 7: www.bank.com= w.x.y.z
DNS Cache Poisoning Alice Dsn.good.com Evil Dns.evil.com www.bank.com Dns.bank.com STEP 8: www.bank.com? In Cache: www.bank.com= w.x.y.z STEP 9: w.x.y.z STEP 10: Let’s Bank!!!!
DNS Cache Poisoning Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DNS Cache Poisoning Defense ,[object Object],[object Object],[object Object]
 
Rootkits

More Related Content

What's hot

Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
 
Ipsec
IpsecIpsec
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
OECLIB Odisha Electronics Control Library
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
SURBHI SAROHA
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
david rom
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
Department of Computer Science
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
Security Innovation
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
Vi Tính Hoàng Nam
 
Encryption
EncryptionEncryption
Encryption
vasanthimuniasamy
 
Password Cracking using dictionary attacks
Password Cracking using dictionary attacksPassword Cracking using dictionary attacks
Password Cracking using dictionary attacks
lord
 
컴퓨터 네트워크와 인터넷
컴퓨터 네트워크와 인터넷컴퓨터 네트워크와 인터넷
컴퓨터 네트워크와 인터넷
중선 곽
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Chap7 2 Ecc Intro
Chap7 2 Ecc IntroChap7 2 Ecc Intro
Chap7 2 Ecc Intro
Edora Aziz
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
AAKASH S
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
Pradipta Poudel
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 

What's hot (20)

Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Ipsec
IpsecIpsec
Ipsec
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Encryption
EncryptionEncryption
Encryption
 
Password Cracking using dictionary attacks
Password Cracking using dictionary attacksPassword Cracking using dictionary attacks
Password Cracking using dictionary attacks
 
컴퓨터 네트워크와 인터넷
컴퓨터 네트워크와 인터넷컴퓨터 네트워크와 인터넷
컴퓨터 네트워크와 인터넷
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Chap7 2 Ecc Intro
Chap7 2 Ecc IntroChap7 2 Ecc Intro
Chap7 2 Ecc Intro
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 

Similar to Best!

Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
Mukesh Chaudhari
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
samis
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkits
UltraUploader
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
masoodnt10
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Sniffing in a Switched Network
Sniffing in a Switched NetworkSniffing in a Switched Network
Sniffing in a Switched Network
amiable_indian
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Kunal Thakur
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
NathanAn
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Olli-Pekka Niemi
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
Iwan89629
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
All About Snort
All About SnortAll About Snort
All About Snort
28pranjal
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
Amit Kumar
 
Network security
Network securityNetwork security
Network security
syed mehdi raza
 
3.Network
3.Network3.Network
3.Network
phanleson
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
DAVID RAUDALES
 

Similar to Best! (20)

Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
An overview of unix rootkits
An overview of unix rootkitsAn overview of unix rootkits
An overview of unix rootkits
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Sniffing in a Switched Network
Sniffing in a Switched NetworkSniffing in a Switched Network
Sniffing in a Switched Network
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
All About Snort
All About SnortAll About Snort
All About Snort
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
 
Network security
Network securityNetwork security
Network security
 
3.Network
3.Network3.Network
3.Network
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
 

More from gofortution

Cita310chap09
Cita310chap09Cita310chap09
Cita310chap09
gofortution
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
gofortution
 
Ch03
Ch03Ch03
gofortution
gofortutiongofortution
gofortution
gofortution
 
gofortution
gofortutiongofortution
gofortution
gofortution
 
gofortution
gofortutiongofortution
gofortution
gofortution
 

More from gofortution (6)

Cita310chap09
Cita310chap09Cita310chap09
Cita310chap09
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Ch03
Ch03Ch03
Ch03
 
gofortution
gofortutiongofortution
gofortution
 
gofortution
gofortutiongofortution
gofortution
 
gofortution
gofortutiongofortution
gofortution
 

Best!

  • 1. Computer & Network Hacker Exploits Step-by step Part 2
  • 2.
  • 4.
  • 5. Attacker Firewall IP=10.1.1.1 IP=10.2.1.10 Port 80 Port 23 IDS Penetration – IP Fragments Server
  • 6.
  • 7. tcp ip ip Normal IP Fragmentation Penetration – IP Fragments To support different transmission media, IP allows for the breaking up of single large packets into smaller packets, called fragments. The higher‑level protocol carried in IP (usually TCP or UDP) is split up among the various fragments. ip tcp ip tcp ip tcp ip tcp ip tcp ip tcp
  • 8. Tiny Fragment Attack Penetration – IP Fragments tcp ip ip Make a fragment small enough so that the TCP header is split between two fragments. The port number will be in the second fragment. ip tcp ip tcp ip tcp ip tcp ip tcp ip tcp ip
  • 9.
  • 10.
  • 11. Attacker Firewall IDS Penetration – IP Fragments Fragment 1 (part of tcp header) Fragment 2(rest of tcp header) Tcp port unknown All IP fragments are re-assembled Server ip tcp ip tcp
  • 12.
  • 13. Attacker Firewall IDS Penetration – IP Fragments Fragment 1 (Packet is for port 80) Tcp port 80. OK! All IP fragments are re-assembled Fragment Overlap attack ‑ In the second fragment, lie about the offset from the first fragment. When the packet is reconstructed at the protected server, the port number will be overwritten. Fragment 2 (Packet says is for port 80), however, I have an offset, say 12, and After overlaying, the TCP header will read port 23! Second IP fragment was just a fragment of the first. That is OK too! Server ip tcp ip tcp
  • 14.
  • 15.
  • 17.
  • 18.
  • 19. HUB Blah, blah , blah Blah, blah , blah Blah, blah , blah Blah, blah , blah BROADCAST ETHERNET
  • 20. HUB Blah, blah , blah Blah, blah , blah Blah, blah , blah Blah, blah , blah BROADCAST ETHERNET
  • 21. SWITCH Blah blah blah Blah, blah , blah SWITCHED ETHERNET
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30.
  • 31. Alice Eve Alice telnets to do some work.. Eve is on a segment of the lan where she can sniff, or on a point in the path. Bob
  • 32. Alice Eve Alice telnets to do some work.. Attacker can monitor and generate packets with the same sequence number. “ Hi, I am Alice” Eve uses a session hijacking tool to observe the session. at Eve's command, the session hijacking tool jumps in and continues the session with Bob. Attacker can kick Alice off and make any changes on B. The logs will show that Alice made the changes Bob
  • 33. Alice Eve Session Hijacking: Ack Storms If the attacker just jumps in on a session, starting to spoof packets, the sequence numbers between the two sides will get out of synch As the two sides try to resynchronize, they will resend SYNs and ACKs back and forth trying to figure out what's wrong, resulting in an ACK storm SYN (A, SNa) ACK (SNb) SYN (B, SNb) ACK (SLNa) SYN(A,Sna) ACK(SNb) Bob
  • 34.
  • 35.
  • 36.
  • 37. Alice Eve MAC=CC.CC “ ARP w.x.y.z is at DD.DD” “ ARP a.b.c.d is at EE.EE” Ip=w.x.y.z MAC=BB.BB Ip=a.b.c.d MAC=AA.AA Eve send a Gratuitous ARP broadcast message Bob
  • 38.
  • 39.
  • 40.  
  • 41.
  • 42.
  • 43. Domain Name System (DNS) Cache Poisoning
  • 44.
  • 45. www.ebay.com www.ebay.com www.ebay.com www.ebay.com Client Local Nameserver Root Name Server .com Name Server ebay.com Name Server Referral to .com Referral to ebay.com The Answer! 216.32.120.133 Clients use a "resolver" to access DNS servers Most common DNS server is BIND, Berkeley Internet Name Domain DNS servers query each other
  • 46.
  • 47.
  • 48. Alice, a happy bank customer Evil Attacker Dns.bank.com name server Alice wants to access. Dsn.good.com Alice’s unsuspecting DNS Server Dns.evil.com, Evil’s DNS server owned by evil www.bank.com, Alice’s online bank.
  • 49. DNS Cache Poisoning Alice Dsn.good.com Evil Dns.evil.com www.bank.com Dns.bank.com STEP 1: Any.evil.com STEP 2: Any.evil.com STEP 3: store the query ID
  • 50. DNS Cache Poisoning Alice Dsn.good.com Evil Dns.evil.com www.bank.com Dns.bank.com STEP 4: www.bank.com STEP 6: Spoofed ans: www.bank.com=w.x.y.z STEP 5: www.bank.com STEP 7: www.bank.com= w.x.y.z
  • 51. DNS Cache Poisoning Alice Dsn.good.com Evil Dns.evil.com www.bank.com Dns.bank.com STEP 8: www.bank.com? In Cache: www.bank.com= w.x.y.z STEP 9: w.x.y.z STEP 10: Let’s Bank!!!!
  • 52.
  • 53.
  • 54.