[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Exploit for DNS Cache Poisoning - RELEASED
- Subject: Exploit for DNS Cache Poisoning - RELEASED
- From: jgreco at ns.sol.net (Joe Greco)
- Date: Wed, 23 Jul 2008 17:30:39 -0500 (CDT)
- In-reply-to: <001b01c8ed11$72ec39d0$58c4ad70$@edu> from "Robert D. Scott" at Jul 23, 2008 06:14:17 PM
> Now, there is an exploit for it.
>
> http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
Maybe I'm missing it, but this looks like a fairly standard DNS exploit.
Keep asking questions and sending fake answers until one gets lucky.
It certainly matches closely with my memory of discussions of the
weaknesses in the DNS protocol from the '90's, with the primary difference
being that now networks and hardware may be fast enough to make the
flooding (significantly) more effective. I have to assume that one other
standard minor enhancement has been omitted (or at least not explicitly
mentioned), and will refrain from mentioning it for now.
So, I have to assume that I'm missing some unusual aspect to this attack.
I guess I'm getting older, and that's not too shocking. Anybody see it?
... JG
--
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.