funsec mailing list archives
Re: An example of DNS forensics
From: Daniel Uriah Clemens <superman () packetninjas org>
Date: Thu, 27 Oct 2005 17:51:21 +0000
+++ Richard M. Smith [26/10/05 10:29 -0400]: ->http://www.nytimes.com/2005/10/26/technology/26google.html?pagewanted=print -> ->Google Found to Be Testing Classified Ads -> ->By JOHN MARKOFF -> ->SAN FRANCISCO, Oct. 25 - An online classified service being tested by Google ->set off intense speculation on Tuesday after a Web site for the service was ->accidentally made public and discovered by a computer programmer on Monday. -> ->The service, which was named Google Base and was for a time accessible at ->base.google.com, described itself as "Google's database into which you can ->add all types of content." -> I guess this is a good find, or simply a bad security practice made by google. -> ->The Google Base page was discovered on Monday by Tony Ruscoe, a British ->programmer, who said he had created an automatic program to search for ->subdomains accessible at the Google.com Web site. The company, based in ->Mountain View, Calif., took down the test site and replaced the page with a ->"403" forbidden-access response. -> I guess the author being John Markoff kindoff hits a few trigger points. Its just like John to over sexualize the use of a dns scanner. Just one off the top of my head - http://packetstormsecurity.org/UNIX/scanners/blindcrawl.pl -- -Daniel Uriah Clemens Esse quam videra (to be, rather than to appear) -Moments of Sorrow are Moments of Sobriety { o)2059686335 c)2055676850 } {Fingerprint C5B8 DB37 CC77 3C2B 0027 D2A6 D766 1F0E FE27 ADC8 }
Attachment:
_bin
Description:
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- An example of DNS forensics Richard M. Smith (Oct 26)
- Re: An example of DNS forensics Daniel Uriah Clemens (Oct 27)