Google recently launched a public DNS service similar to the popular service over at OpenDNS, you can find it on Googlecode here – http://code.google.com/speed/public-dns/. The first obvious reaction for the infosec crowd (with all the recent DNS flaws), is to question the security of the Google DNS service. HD Moore has done some good analysis […]
Tag Archive | "dan-kaminsky"
If any of you follow the mailings lists or the ‘scene’ as it’s known, you’d be familiar with PHC, Phrack, Gobbles, ~el8, Silvio, gayh1tler and the whole Whitehat Holocaust AKA pr0j3kt m4yh3m. (Back when it went public). The war against whitehats has started up again more vehemently recently with zine known as zero for owned […]
It’s somewhat ironic that shortly after the Kaminsky DNS bug went wild and almost immediately got ported into Metasploit that it was then used to attack HD Moore’s very own company BreakingPoint. It happened just a couple of days ago, it doesnt seem to have been a targeted attack though more like mass spammers/scammers leveraging […]
There has been a lot of hype about this one, but this flaw is a real threat and the working exploits are now available in the wild. To top that, they have already been ported into Metasploit! I hope all the major ISPs are in a patching frenzy right now and not thinking to themselves […]
Scanrand is extremely quick and effective port scanner. It works by forking two distinct processes: One to send the initial queries One to receive responses and reconcile them from the above This makes it extremely fast. If you haven’t heard of the suite, Scanrand is one of the five tools in Paketto Keiretsu by Dan […]