Re: 2nd Exploit for DNS Cache Poisoning - RELEASED
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -- "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net> wrote:
Not sure if anyone has seen yet, but there is a 2nd exploit being circulated. I just picked it up on metasploits SVN trunk....
I haven't seen that one yet, but I just ran across this: http://www.milw0rm.com/exploits/6123 - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.6.3 (Build 3017) wj8DBQFIiNBFq1pz9mNUZTMRAozhAKD+IkD/HGywNFttPI6ilKreNGP0UQCeKZ98 u76UOCvKXD9+zvdlSR8S/oc= =N5am -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/
- -- "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net> wrote:
Not sure if anyone has seen yet, but there is a 2nd exploit being circulated. I just picked it up on metasploits SVN trunk....
I haven't seen that one yet, but I just ran across this:
http://www.milw0rm.com/exploits/6123
- - ferg
Sorry, block from the new one : ===============/======================================================== Exploit ID: CAU-EX-2008-0003 Release Date: 2008.07.23 Title: bailiwicked_domain.rb Description: Kaminsky DNS Cache Poisoning Flaw Exploit for Domains Tested: BIND 9.4.1-9.4.2 Attributes: Remote, Poison, Resolver, Metasploit Exploit URL: http://www.caughq.org/exploits/CAU-EX-2008-0003.txt Author/Email: I)ruid <druid (@) caughq.org> H D Moore <hdm (@) metasploit.com> ===============/======================================================== Tuc/TBOH
participants (2)
-
Paul Ferguson
-
Tuc at T-B-O-H.NET