Thought the community should be aware of this one. A rather lengthy blog
detailing the exact mechanics of DNS cache poisoning got leaked
yesterday. 
 -Eric

http://www.informationweek.com/news/internet/security/showArticle.jhtml?
articleID=209401195



http://www.kb.cert.org/vuls/id/800113

The Domain Name System (DNS) is responsible for translating host names
to IP addresses (and vice versa) and is critical for the normal
operation of internet-connected systems. DNS cache poisoning (sometimes
referred to as cache pollution) is an attack technique that allows an
attacker to introduce forged DNS information into the cache of a caching
nameserver. DNS cache poisoning is not a new concept; in fact, there are
published articles that describe a number of inherent deficiencies in
the DNS protocol and defects in common DNS implementations that
facilitate DNS cache poisoning. The following are examples of these
deficiencies and defects:

Eric Albert
Application Engineer
Alvarion, Inc.





************************************************************************************
This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals & computer 
viruses(84).
************************************************************************************




--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to