Multiple DNS implementations vulnerable to cache poisoning

Owen DeLong owen at delong.com
Tue Jul 8 19:20:30 CDT 2008


The tool, unfortunately, only goes after the server it thinks you are  
using to
recurse from the client where you're running your browser.

This makes it hard to test servers being used in production environments
without GUIs.  The tool is not Lynx compatible.

Owen

On Jul 8, 2008, at 5:12 PM, Lynda wrote:

> This is also being covered over on the Defcon Forums. Jeff Moss has  
> said that he'll post the link to the interview that Kaminsky is  
> doing right now, after it's over. Here's the link to the Forum  
> discussion:
>
> https://forum.defcon.org/showthread.php?t=9547
>
> The forum link also has a link to Dan's tool, where you can see if  
> your DNS server is vulnerable.
>
> -- 
> In April 1951, Galaxy published C.M. Kornbluth's "The Marching  
> Morons".
> The intervening years have proven Kornbluth right.
>                --Valdis Kletnieks





More information about the NANOG mailing list