lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Jun 28 03:31:12 2006
From: angray at beeb.net (Aaron Gray)
Subject: DNS poisoning

You would need to hack the program code of BIND or what ever DNS server 
software you are using.

Aaron

----- Original Message ----- 
From: "Saeed Abu Nimeh" <drellman@...mail.com>
To: <full-disclosure@...ts.grok.org.uk>
Sent: Tuesday, June 27, 2006 10:47 PM
Subject: [Full-disclosure] DNS poisoning


> Is there a way to do dns poisoning and make the poisoned server provide
> legitimate queries when doing dns lookup. Example: Assume I am running a
> poisoned dns server, when user X does lookup yahoo.com or dig yahoo.com
> I reply with legit yahoo entries, however, when user Y does the same
> thing I provide fake or spoofed entires.
> Thanks,
> Saeed
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
> -- 
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.1.394 / Virus Database: 268.9.5/377 - Release Date: 27/06/2006
> 

Powered by blists - more mailing lists