[dns-operations] first (lab) spoof of a fully source port randomised server reported

bert hubert bert.hubert at netherlabs.nl
Fri Aug 8 13:18:08 UTC 2008


http://tservice.net.ru/~s0mbre/blog/devel/networking/dns/2008_08_08.html

"Attack took about half of the day, i.e. a bit less than 10 hours.
 So, if you have a GigE lan, any trojaned machine can poison your DNS during
 one night... "

-- 
http://www.PowerDNS.com      Open source, database driven DNS Software 
http://netherlabs.nl              Open and Closed source services



More information about the dns-operations mailing list