Exploit for DNS Cache Poisoning - RELEASED

Paul Ferguson fergdawg at netzero.net
Wed Jul 23 20:28:15 CDT 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- "Robert D. Scott" <robert at ufl.edu> wrote:

>Now, there is an exploit for it.
>
>http://www.caughq.org/exploits/CAU-EX-2008-0002.txt

Now also (mirrored) here:

 http://www.milw0rm.com/exploits/6122

...and probably a slew of other places, too. ;-)

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIh9qmq1pz9mNUZTMRAuXEAJ0cmn10Rz4Z0RG5LfseroFFvLbUmgCgipoV
rLDjjPCo+7w7+aV8udRK7fc=
=n1cC
-----END PGP SIGNATURE-----



--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/






More information about the NANOG mailing list