Multiple DNS implementations vulnerable to cache poisoning
christian at broknrobot.com
Tue Jul 8 19:38:56 CDT 2008
surely the tool is not focused at a dns operator/admin audience..
On Tue, Jul 8, 2008 at 8:20 PM, Owen DeLong <owen at delong.com> wrote:
> The tool, unfortunately, only goes after the server it thinks you are using
> recurse from the client where you're running your browser.
> This makes it hard to test servers being used in production environments
> without GUIs. The tool is not Lynx compatible.
> On Jul 8, 2008, at 5:12 PM, Lynda wrote:
> This is also being covered over on the Defcon Forums. Jeff Moss has said
>> that he'll post the link to the interview that Kaminsky is doing right now,
>> after it's over. Here's the link to the Forum discussion:
>> The forum link also has a link to Dan's tool, where you can see if your
>> DNS server is vulnerable.
>> In April 1951, Galaxy published C.M. Kornbluth's "The Marching Morons".
>> The intervening years have proven Kornbluth right.
>> --Valdis Kletnieks
More information about the NANOG