Full Disclosure mailing list archives
Re: [bugtraq] Re: CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning
From: "Tuc at T-B-O-H.NET" <ml () t-b-o-h net>
Date: Fri, 25 Jul 2008 16:09:07 -0400 (EDT)
On FreeBSD 7.0-STABLE (updated on Fri May 23) it fails to create raw socket even when running as root: ... [-] This module is configured to use a raw IP socket. On Unix systems, only the root user is allowed to create raw sockets.Please run the framework as root to use this module. [*] Attempting to inject poison records for example.com.'s nameservers into 202.72.241.4:55088... [-] Auxiliary failed: undefined method `sendto' for nil:NilClass
Thats a known issue. May be on any *BSD system, not sure about Windows. The authors were alerted, but don't have a time to resolution set. I guess Linux is the default of the hack platform. ;) Tuc/TBOH _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit I)ruid (Jul 23)
- Re: CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit Ganbold (Jul 24)
- Re : CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit tixxDZ (Jul 25)
- Re: Re : CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit H D Moore (Jul 25)
- Re: [bugtraq] Re: CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Tuc at T-B-O-H.NET (Jul 25)
- Re : CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit tixxDZ (Jul 25)
- Re: CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit Ganbold (Jul 24)