[nsp-sec] DNS poisoning activity in the wild

Joel Rosenblatt joel at columbia.edu
Wed Jul 30 11:24:59 EDT 2008


The articles are already out on this

<http://www.pcworld.com/article/149126/2008/07/.html>


--On Wednesday, July 30, 2008 5:03 PM +0200 Florian Weimer <fweimer at bfk.de> wrote:

> ----------- nsp-security Confidential --------
>
> * Jose Nazario:
>
>> after seeing hdm blog this:
>>
>> | After seeing the SBC/ATT server for Austin get poisoned, serve up |
>> advertisements, and eventually get taken offline, I decided to add a |
>> module to compare DNS results between two servers.
>>
>> via http://blog.metasploit.com/2008/07/checking-for-cache-poisoning.html
>
> HD Moore had publicly visible ARP poisoning issues on his networks
> before.  IMHO, it's not necessarily one of the new attacks.  And the
> alleged bad data in the AT&T caches hasn't been reported elsewhere.
>
>> now, hdm did this as a proof of concept. but i have to wonder: how
>> much actual DNS poisoning is occurring and where is it coming from?
>
> I only see scans supposedly from researchers, but I'm not really
> tracking this.
>
> --
> Florian Weimer                <fweimer at bfk.de>
> BFK edv-consulting GmbH       http://www.bfk.de/
> Kriegsstraße 100              tel: +49-721-96201-1
> D-76133 Karlsruhe             fax: +49-721-96201-99
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________



Joel Rosenblatt, Manager Network & Computer Security
Columbia Information Security Office (CISO)
Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
http://www.columbia.edu/~joel




More information about the nsp-security mailing list