Modifying the records of a DNS server is called […]
DNS Poisoning
The […], which contains FQDNs and IP addresses, takes precedent over DNS queries, making it a prime target for attackers. It does require access to the machine and admin privileges to do though
Client host file
An attacker that gains access to domain registration, and therefore controls the DNS names and IP addresses, is called […]
Can be done by brute force, social engineering the password, the usual stuff
Domain Hijacking
[…] involves an attacker taking advantage of a users spelling mistakes to redirect them to a malicious URL (Typosquatting)
Ex: Gooogle.com
Googles.com
Google.org
URL Hijacking