[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[no subject]
- <!--x-content-type: text/plain -->
- <!--x-date: Wed Apr 6 20:22:21 2005 -->
- <!--x-from-r13: nqeva ng unfjrf.ubzryvahk.bet (V. Oqeva Egbel) -->
- <!--x-message-id: [email protected] -->
- <!--x-reference: [email protected] -->
- <!--x-reference: [email protected] --> "http://www.w3.org/TR/html4/loose.dtd">
- <!--x-subject: [ale] AOL, DNS poisoning and spam -->
- <li><em>date</em>: Wed Apr 6 20:22:21 2005</li>
- <li><em>from</em>: adrin at haswes.homelinux.org (H. Adrin Story)</li>
- <li><em>in-reply-to</em>: <[email protected]></li>
- <li><em>references</em>: <<a href="msg00122.html">[email protected]</a>> <[email protected]></li>
- <li><em>subject</em>: [ale] AOL, DNS poisoning and spam</li>
I got
; <<>> DiG 9.2.3 <<>> www.aol.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30657
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 0
;; QUESTION SECTION:
;www.aol.com. IN A
;; ANSWER SECTION:
www.aol.com. 1808 IN CNAME www.gwww.aol.com.
www.gwww.aol.com. 47 IN A 64.12.187.22
;; AUTHORITY SECTION:
gwww.aol.com. 234 IN NS mtc-gdns004.ns.aol.com.
gwww.aol.com. 234 IN NS dtc-gdns004.ns.aol.com.
;; Query time: 52 msec
;; SERVER: 205.152.144.23#53(205.152.144.23)
;; WHEN: Wed Apr 6 20:12:31 2005
;; MSG SIZE rcvd: 123
I think the *.ru4.com is the popup and adds on the webpage. www.aol.com
looks okay to me. but then I wouldn't know if it was bad. wait AOL is
bad isn't it?
Michael H. Warfield wrote:
> On Wed, 2005-04-06 at 16:21 -0400, James P. Kinney III wrote:
>
>>I just read the DNS poisoning notice from /. I went to www.aol.com and
>>noticed the site was taking forever to load as the url bar at the bottom
>>of firefox kept saying waiting on http300.content.edge.ru4.com
>
>
> Ok... So what is your resolver pointing to? There are a LOT of people
> trying to track this down and a lot of it appears to be compromised
> Windows based DNS servers. The jury is still out if it's compromised
> Windows systems which have been taken over or if it's truely DNS cache
> poisoning. Researchers are wanting to get at compromised DNS servers
> and analyze what has happened at them.
>
>
>>The whois on ru4.com looks like a spammer to me. (OK, so does AOL, but
>>that's a different thread).
>
>
> So... Run the command "dig www.aol.com" and tell us what you get.
> Also, what is in your "/etc/resolve.conf" file? I'll pass the
> information on to the security community.
>
> Note to that some "pharming" attacks are targeting the mhosts files on
> Windows boxes and will have the same effect.
>
> Mike
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> <a rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale">http://www.ale.org/mailman/listinfo/ale</a>
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00122" href="msg00122.html">[ale] AOL, DNS poisoning and spam</a></strong>
<ul><li><em>From:</em> jkinney at localnetsolutions.com (James P. Kinney III)</li></ul></li>
<li><strong><a name="00124" href="msg00124.html">[ale] AOL, DNS poisoning and spam</a></strong>
<ul><li><em>From:</em> mhw at wittsend.com (Michael H. Warfield)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg00124.html">[ale] AOL, DNS poisoning and spam</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg00126.html">[ale] AOL, DNS poisoning and spam</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00124.html">[ale] AOL, DNS poisoning and spam</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg00126.html">[ale] AOL, DNS poisoning and spam</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#00125"><strong>Date</strong></a></li>
<li><a href="threads.html#00125"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>