[106158] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Tuc at T-B-O-H.NET)
Wed Jul 23 22:33:25 2008

From: "Tuc at T-B-O-H.NET" <ml@t-b-o-h.net>
To: fergdawg@netzero.net (Paul Ferguson)
Date: Wed, 23 Jul 2008 22:32:58 -0400 (EDT)
In-Reply-To: <20080723.182815.4469.2@webmail22.vgs.untd.com>
Cc: nanog@merit.edu
Errors-To: nanog-bounces@nanog.org

> - -- "Robert D. Scott" <robert@ufl.edu> wrote:
> 
> >Now, there is an exploit for it.
> >
> >http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
> 
> Now also (mirrored) here:
> 
>  http://www.milw0rm.com/exploits/6122
> 
> ...and probably a slew of other places, too. ;-)
> 
	The changes the put into metasploit for this don't seem
to work if running from FreeBSD 5.5, possibly other BSD's and 
versions from talking to the author. 

		Tuc/TBOH


home help back first fref pref prev next nref lref last post