lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 25 Jul 2008 20:05:44 +0100 From: tixxDZ <tixxdz@...il.com> To: Ganbold <ganbold@...om.mng.net> Cc: full-disclosure@...ts.grok.org.uk, bugtraq <bugtraq@...urityfocus.com> Subject: Re : CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit I do not want to offend anyone (Metasploit people), this is a simple joke: can you share with us all the logs of the vulnerable servers ? ;) , the exploit will use the Metasploit service to verify exploitability. ex checking my Opendns: 1- check $ dig -t txt red.metasploit.com ; <<>> DiG 9.4.0 <<>> -t txt red.metasploit.com ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 35629 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;red.metasploit.com. IN TXT ;; ANSWER SECTION: red.metasploit.com. 1 IN TXT "208.69.34.10:1656 red.metasploit.com" ;; Query time: 1005 msec ;; SERVER: 208.67.222.222#53(208.67.222.222) ;; WHEN: Fri Jul 25 20:02:21 2008 ;; MSG SIZE rcvd: 85 2- check $ dig -t txt red.metasploit.com ; <<>> DiG 9.4.0 <<>> -t txt red.metasploit.com ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52691 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;red.metasploit.com. IN TXT ;; ANSWER SECTION: red.metasploit.com. 1 IN TXT "208.69.34.10:14817 red.metasploit.com" ;; Query time: 398 msec ;; SERVER: 208.67.222.222#53(208.67.222.222) ;; WHEN: Fri Jul 25 20:02:22 2008 ;; MSG SIZE rcvd: 86 -- tix or tixxDZ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists