[dns-operations] DNS deluge for x.p.ctrc.cc
paul at vix.com
Mon Feb 27 04:10:44 UTC 2006
# The are plently of other methods, beyond direct DNS queries,
# that expose nameservers to cache poisoning techniques.
# Turning off global recursion won't save you from being cache
# poisoned if your nameserver is vulnerable. The best way to
# be protected from cache poisoning is to have up to date
recursive nameservers can be poisoned without using any code bugs. all you
need to do is own a real domain for a short while (like, from when you start
using it in outbound phish spam, until it gets cancelled by the registrar).
you publish your www.whatever.biz A RRset with an obscenely long TTL, and
use one a rented botnet to slow-scan your list of ~580K open recursive name
servers with queries for that A RRset. then, even though your domain gets
cancelled, most victims of your phish spam will still be able to look up your
(now dead) A RRset.
the ways in which open recursive name servers are dangerous, are innumerable.
More information about the dns-operations