Get fresh insights, pro tips, and thought starters–only the best of posts for you.
DNS Rebinding is a web-based attack technique that manipulates a browser’s same-origin policy by rapidly changing the IP address associated with a domain name, allowing attackers to access internal network resources through the victim’s browser.
DNS rebinding exploits how browsers trust domains rather than IP addresses. An attacker registers a malicious domain and configures its DNS server to return different IP addresses in quick succession.
Initially, the domain resolves to an attacker-controlled server, which loads a script in the victim’s browser. Afterward, the DNS response changes (“rebinds”) to point to a local or internal IP (e.g., 192.168.x.x). Since the browser still associates the domain with the original origin, the script can now interact with internal systems such as routers, IoT devices, or enterprise applications.
This effectively turns the victim’s browser into a proxy for internal network access—bypassing firewalls and network segmentation.
| Attack Type | Key Mechanism | Target | Dependency |
|---|---|---|---|
| DNS Rebinding | DNS manipulation + same-origin bypass | Internal network resources | Browser + DNS behavior |
| CSRF | Authenticated request forgery | Web applications | User session/authentication |
| XSS | Script injection | Web application users | Application input validation |
DNS rebinding poses a significant risk in modern environments with unmanaged devices and internal web interfaces. Attackers can:
Because the attack originates from a trusted browser session, traditional perimeter defenses often fail to detect it.
Organizations should adopt layered defenses:
Zero Trust architectures further reduce the attack surface by limiting implicit trust within internal networks.
What is DNS Rebinding in simple terms?
DNS rebinding tricks a browser into accessing internal systems by changing a website’s IP address after the initial connection.
Is DNS Rebinding still a threat today?
Yes. It remains relevant due to the rise of IoT devices, internal APIs, and poorly secured local services.
Can firewalls stop DNS Rebinding attacks?
Not always. Since the request originates from inside the network (via the browser), traditional firewalls may not block it.
How can organizations detect DNS Rebinding attempts?
Look for rapid DNS resolution changes, unusual internal requests from browsers, and anomalous traffic patterns targeting local IP ranges.