[28545] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: DomainSiren.com Whois records alert service

daemon@ATHENA.MIT.EDU (Roeland Meyer (E-mail))
Sat May 6 20:12:41 2000

Reply-To: <rmeyer@mhsc.com>
From: "Roeland Meyer (E-mail)" <rmeyer@mhsc.com>
To: "'domainiac'" <domainiac@HOME.COM>,
	<DOMAIN-POLICY@LISTS.INTERNIC.NET>
Cc: "LIST NANOG (E-mail)" <nanog@merit.edu>
Date: Sat, 6 May 2000 17:09:57 -0700
Message-ID: <000d01bfb7b8$94e0a900$eaaf6cc7@PEREGRIN>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
In-Reply-To:  <006601bfb7af$f3b098e0$b5e20a18@alex1.va.home.com>
Errors-To: owner-nanog-outgoing@merit.edu


Cute dude. OTOH, this probably has enough operational content to merit =
posting to NANOG. Now all we need is for some script-kiddee to figure it =
out <groan>.

> Behalf Of domainiac
> Sent: Saturday, May 06, 2000 4:08 PM
>=20
> I figured out a way to completely hijack a domain in less=20
> than week under
> the new shared system.  And by hijack I do not mean simply=20
> redirect the DNS,
> etc. I mean completely change the whois record to a new=20
> owner.  I won't post
> specific directions but I am sure others could do the same=20
> trick as it is
> not that complicated.  I passed the specific directions onto=20
> ICANN but who
> knows if they are likely to do anything.  The vulnerability=20
> only applies to
> NSI domains with MAIL-FROM (or when their CRYPT-PW system screws up).
>=20
> I set up an automated system that reads both the registry and=20
> registrar
> records, compares it the stored records, and automatically=20
> e-mails contacts
> with the changed info.  It also can be used to track domains=20
> about to be
> released.
>=20
> http://DomainSiren.com
>=20
> Russ Smith
> http://ChangeYourDomain.com



home help back first fref pref prev next nref lref last post