[Owasp-Mumbai] DNS poisoning - wide impact

chintan dave davechintan at gmail.com
Thu Jul 10 08:29:57 EDT 2008


It was published on US cert yesterday, if i m not wrong.
http://www.us-cert.gov/cas/techalerts/TA08-190B.html

On Thu, Jul 10, 2008 at 5:27 AM, Kamat, Jitesh <Jitesh.Kamat at gs.com> wrote:

> Most of you are probably already aware of the recent DNS poisoning
> vulnerability (read more here:
> http://www.darkreading.com/document.asp?doc_id=158442&WT.svl=news1_2)
> that was discovered by Dan Kaminsky. To remediate this one , major
> players in the industry have collaborated - this is an impressive
> effort.
>
> Readup Kaminsky's blog which also has a quick DNS checker to find if
> your own firm's DNS is vulnerable: http://www.doxpara.com/?p=1162
>
>  - Jitesh Kamat
> _______________________________________________
> OWASP-Mumbai mailing list
> OWASP-Mumbai at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-mumbai
>



-- 
Warmest Regards,
Chintan Dave,
Risk Advisory Services,
KPMG - Singapore

http://www.linkedin.com/in/chintandave
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-mumbai/attachments/20080710/2eab8152/attachment.html 


More information about the OWASP-Mumbai mailing list