Re: Public implementation of birthday attack ( dns poisoning ) ?

From: Ramon Izaguirre (ramontxo@hotpop.com)
Date: Thu Mar 27 2003 - 15:09:52 EST


    Yes I am modifiying a perl script that checks the probability of
launching such an attack that is included in the article of security focus
about the Birthday Attack DNS Spoofing but I must first check it with the
author of this script. It would check also if the source port is always the
same or it changes as it would be almost imposible otherwise. Also check if
ip spoofing is possible with the ISP where you are running, ...

    Why? Do you need it for yesterday? :)

     If you would like to do it for yourself I have no problem with that.
The name would be happydnspoofing if you like it.

    Regards,

    Ramon Izaguirre

----- Original Message -----
From: "Fabio Pietrosanti (naif)" <naif@inet.it>
To: <pen-test@securityfocus.com>
Sent: Thursday, March 27, 2003 4:28 PM
Subject: Public implementation of birthday attack ( dns poisoning ) ?

> Does anyone know or it's working on a implementation of birtghday attack
for
> dns poisoning?
>
> Regards
>
> --
>
> Fabio Pietrosanti ( naif )
> E-mail: fabio@pietrosanti.it - naif@sikurezza.org - fpietrosanti@acm.org
> PGP Key available on my homepage: http://fabio.pietrosanti.it/
> --
> And you will learn to be paranoid and cynical...
> --
>
> top spam and e-mail risk at the gateway.
> SurfControl E-mail Filter puts the brakes on spam & viruses
> and gives you the reports to prove it. See exactly how much
> junk never even makes it in the door. Free 30-day trial:
> http://www.surfcontrol.com/go/zsfptl1
>

top spam and e-mail risk at the gateway.
SurfControl E-mail Filter puts the brakes on spam & viruses
and gives you the reports to prove it. See exactly how much
junk never even makes it in the door. Free 30-day trial:
http://www.surfcontrol.com/go/zsfptl1



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:31 EDT