nanog mailing list archives
Re: 2nd Exploit for DNS Cache Poisoning - RELEASED
From: "Paul Ferguson" <fergdawg () netzero net>
Date: Thu, 24 Jul 2008 18:56:22 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -- "Tuc at T-B-O-H.NET" <ml () t-b-o-h net> wrote:
Not sure if anyone has seen yet, but there is a 2nd exploit being circulated. I just picked it up on metasploits SVN trunk....
I haven't seen that one yet, but I just ran across this: http://www.milw0rm.com/exploits/6123 - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.6.3 (Build 3017) wj8DBQFIiNBFq1pz9mNUZTMRAozhAKD+IkD/HGywNFttPI6ilKreNGP0UQCeKZ98 u76UOCvKXD9+zvdlSR8S/oc= =N5am -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/
Current thread:
- 2nd Exploit for DNS Cache Poisoning - RELEASED Tuc at T-B-O-H.NET (Jul 24)
- Question: 2nd Exploit for DNS Cache Poisoning - RELEASED Jack Bates (Jul 24)
- <Possible follow-ups>
- Re: 2nd Exploit for DNS Cache Poisoning - RELEASED Paul Ferguson (Jul 24)
- Re: 2nd Exploit for DNS Cache Poisoning - RELEASED Tuc at T-B-O-H.NET (Jul 24)