DNS hacks often fall into apparent sorts, equivalent to DNS poisoning (manipulating DNS information to redirect customers), area shadowing (including malicious sub-domains to a DNS report), or CNAME assaults (hijacking lapsed sub-domains).
Sitting Geese turned out to be completely different, and needed to do with weaknesses in the best way domains are administered, or not administered. In some circumstances, domains had been changing into “lame”.
This occurs when the entity registering a website delegates what is known as authoritative DNS to a second supplier. For instance, a website is registered legally with one supplier, however the DNS decision itself is dealt with by a server belonging to a second supplier.