[Owasp-Mumbai] DNS poisoning - wide impact

MuNNa sant.jadhav at gmail.com
Thu Jul 10 11:01:23 EDT 2008


An interesting article:

http://www.maestro-sec.com/forum/viewtopic.php?t=546&f=3

Santosh J.

On Thu, Jul 10, 2008 at 5:59 PM, chintan dave <davechintan at gmail.com> wrote:

> It was published on US cert yesterday, if i m not wrong.
> http://www.us-cert.gov/cas/techalerts/TA08-190B.html
>
>
> On Thu, Jul 10, 2008 at 5:27 AM, Kamat, Jitesh <Jitesh.Kamat at gs.com>
> wrote:
>
>> Most of you are probably already aware of the recent DNS poisoning
>> vulnerability (read more here:
>> http://www.darkreading.com/document.asp?doc_id=158442&WT.svl=news1_2)
>> that was discovered by Dan Kaminsky. To remediate this one , major
>> players in the industry have collaborated - this is an impressive
>> effort.
>>
>> Readup Kaminsky's blog which also has a quick DNS checker to find if
>> your own firm's DNS is vulnerable: http://www.doxpara.com/?p=1162
>>
>>  - Jitesh Kamat
>> _______________________________________________
>> OWASP-Mumbai mailing list
>> OWASP-Mumbai at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-mumbai
>>
>
>
>
> --
> Warmest Regards,
> Chintan Dave,
> Risk Advisory Services,
> KPMG - Singapore
>
> http://www.linkedin.com/in/chintandave
>
> _______________________________________________
> OWASP-Mumbai mailing list
> OWASP-Mumbai at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-mumbai
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-mumbai/attachments/20080710/42161e4b/attachment.html 


More information about the OWASP-Mumbai mailing list