lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <F511C3C1E3C7DF488FB1A0799A165891639830@mail1.corp.qualys.com>
From: ngirard at qualys.com (Norman Girard)
Subject: DNS Hijack Attacks

Hey Richard,

You should search for DNS Cache Poisoning.

A pretty good document will provide you a lot of information :

http://www.lurhq.com/dnscache.pdf


Regards,
Norman


Norman Girard 
ngirard@...lys.com 
Senior Security Engineer 
Western Region 
Qualys, Inc (www.qualys.com) 
1600 Bridge Parkway 
Redwood Shores, CA 94063 
Tel : +1 650 801 6168 
Fax : +1 650 801 6101 
Cell : +1 650 868 1138 
"On-Demand Security Audits and Vulnerability Management Service for the Enterprise". 



-----Original Message-----
From: Richard Maudsley [mailto:r_i_c_h@...penworld.com]
Sent: Tuesday, November 25, 2003 12:58 PM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] DNS Hijack Attacks


Hello,

Sorry about this post.

I've been trying to find information about DNS Hijack attacks for ages. I
can't seem to find anything about them.

Am I right in thinking that this attack is where a DNS server is broken into
and the routing table modified so that a domain name points to a different
server where the content is controlled by the attacker?

Could anyone point me in the right direction for more information. I was
hoping for a whitepaper or something...

Regards,
    Richard

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ