Exploit for DNS Cache Poisoning - RELEASED

Tuc at T-B-O-H.NET ml at t-b-o-h.net
Fri Jul 25 04:41:05 UTC 2008


> 
> On Thu, Jul 24, 2008 at 10:32 AM, Tuc at T-B-O-H.NET <ml at t-b-o-h.net> wrote:
> 
> > > - -- "Robert D. Scott" <robert at ufl.edu> wrote:
> > >
> > > >Now, there is an exploit for it.
> > > >
> > > >http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
> > >
> > > Now also (mirrored) here:
> > >
> > >  http://www.milw0rm.com/exploits/6122
> > >
> > > ...and probably a slew of other places, too. ;-)
> > >
> >         The changes the put into metasploit for this don't seem
> > to work if running from FreeBSD 5.5, possibly other BSD's and
> > versions from talking to the author.
> >
> >                Tuc/TBOH
> >
> >
> True. On FreeBSD 7.0-STABLE (updated on Fri May 23) it fails to create raw
> socket:
> ...
> [-] This module is configured to use a raw IP socket. On Unix systems, only
> the root user is allowed to create raw sockets.Please run the framework as
> root to use this module.
> 
> [*] Attempting to inject poison records for example.com.'s nameservers into
> 202.72.241.4:55088...
> [-] Auxiliary failed: undefined method `sendto' for nil:NilClass
> 
	Sorry, I just checked it on 7.0 earlier today.

	If you happen to know any FreeBSD Ruby programmers with heavy socket
experience, it would really be helpful. :-D 

	I haven't tried the Python one yet. Probably later today.

			Tuc/TBOH




More information about the NANOG mailing list